Cybersecurity
Network Defense
Learn how to monitor and protect your network and evaluate security alerts.
Get Started Self-Paced
Gain the intermediate knowledge you will use in the workplace as a Junior Cybersecurity Analyst. This course covers ways to monitor your network and how to evaluate security alerts. Delve into the tools and techniques used to protect a network, including access control, firewalls, cloud security, and cryptography. These monitoring and defense tools, along with others, work together to create a layered defense-in-depth cybersecurity strategy. The knowledge and skills that you learn will help you defend networks against many types of attacks and quickly react to any exploits that may occur.
What You’ll Learn:
• Explain approaches to network security defense
• Implement some of the various aspects of system and network defense
• Configure local and server-based access control
• Implement access control lists (ACLs) to filter traffic and mitigate network attacks
• Understand how firewalls are implemented to provide network security
• Implement Zone-Based Policy Firewall using the CLI
• Recommend cloud security requirements based on a given cloud scenario
• Determine the cryptographic techniques that are required to ensure confidentiality, integrity, and authenticity
• Explain how security technologies affect security monitoring
• Use different types of logs and records to store information regarding hosts and the network
• Explain the process of evaluating alerts
• Implement some of the various aspects of system and network defense
• Configure local and server-based access control
• Implement access control lists (ACLs) to filter traffic and mitigate network attacks
• Understand how firewalls are implemented to provide network security
• Implement Zone-Based Policy Firewall using the CLI
• Recommend cloud security requirements based on a given cloud scenario
• Determine the cryptographic techniques that are required to ensure confidentiality, integrity, and authenticity
• Explain how security technologies affect security monitoring
• Use different types of logs and records to store information regarding hosts and the network
• Explain the process of evaluating alerts
Time to Complete: 30 hours
Upcoming Course Dates
-
April 7th 2025
Course Level
- Intermediate
Venues
- Remote
Prerequisites
- None Required
?
Have questions?
We can help with course selection, and answer questions about eligibility requirements and special circumstances. Contact an Alumni Admissions team member