Managing Network Security
Almost every organization uses computer networks to share their information and to support their business operations. When we allow network access to data it is exposed to threats from inside and outside of the organization. This course examines the threats associated with using internal and external networks and how to manage the protection of information when it’s accessible via networks.In this course, a learner will be able to:
● Describe the threats to data from information communication technology (ICT)
● Identify the issues and practices associated with managing network security
● Identify the practices, tools, and methodologies associated with assessing network security
● Describe the components of an effective network security program
Describe the threats to data from information communication technology (ICT)
Identify the issues and practices associated with managing network security
Identify the practices, tools, and methodologies associated with assessing network security
Describe the components of an effective network security program
Syllabus
Syllabus - What you will learn from this course
Week 1
Welcome to the course Managing Network Security (Course 3)
Week 2
Introduction to Networking (Module 3.1)
This is an overview of the learning objectives for the course.
Week 3
Cybersecurity Technology Administration (Module 3.2)
Learning objectives for the module.
Week 4
Wireless and Cloud Networks (Module 3.3)
Learning objectives for the module on Cybersecurity Technology Administration
Week 5
Cybersecurity Network Auditing, Monitoring and Logging (Module 3.4)
Learning objectives for Wireless and Cloud Networks
Week 6
Wrap up for Managing Network Security
FAQ
When will I have access to the lectures and assignments?
Access to lectures and assignments depends on your type of enrollment. If you take a course in audit mode, you will be able to see most course materials for free. To access graded assignments and to earn a Certificate, you will need to purchase the Certificate experience, during or after your audit. If you don't see the audit option:
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
Reviews
I believe there is problem at the final quiz since two of the questions does not accept the correct answers as correct. Questions 1 and 30.
the course was awesome , and clear to read and understand , thanks for the team who prepared the course of managing network secuirty
thanks for this great platform i have learn alot from it.
The course that I attended is an exelent one. This sessions helped me to learn more about cyber security