MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
Perimeter solutions such as firewalls and intrusion prevention systems are shown to have significant drawbacks in common enterprise environments. The result of such weakness is shown to often exist as advanced persistent threats (APTs) from nation-state actors. Such attacks, as well as DDOS and third-party attacks, are shown to have potential solutions for modern enterprise.
Course 3 of 4 in the Introduction to Cyber Security Specialization
Syllabus
WEEK 1
Basic Network Security
This module introduces the basics of TCP/IP for security, including firewall design and use.
WEEK 2
More Advanced Network Security Technologies
This module introduces packet filters, firewall rule sets, proxies, and additional network security methods.
WEEK 3
Network Security Architectures
This module introduces the foundations firewall architectures, intrusion detection, and SOC design.
WEEK 4
Enterprise Network Security
This module introduces the limitations of perimeters, and the challenges in the enterprise of dealing with threats such as DDOS and APT.
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.