Network Defense Essentials is a first-of-its-kind complimentary MOOC certification that provides foundational knowledge and skills in network security with add-on labs for hands-on experience. The course includes 12 modules and optional upgrades to lab ranges covering fundamental network security concepts, including IoT, cryptography, and PKI.

Complete online at your own pace (Self-paced). Portal login details to follow in separate email.

Description

WHAT YOU WILL LEARN

1. Network Security Fundamentals

  • Fundamentals of network security
  • Network security protocols that govern the flow of data

2. Identification, Authentication, and Authorization

  • Access control principles, terminologies, and models
  • Identity and access management (IAM)

3. Network Security Controls: Administrative Controls

  • Regulatory frameworks, laws, and acts
  • Security policies, and how to conduct security and awareness training

4. Network Security Controls: Physical Controls

  • Importance of physical security and physical security controls
  • Physical security policies and procedures
  • Best practices to strengthen workplace security
  • Environmental controls

5. Network Security Controls: Technical Controls 

  • Types of bastion hosts and their role in network security
  •  IDS/IPS types and their role in network defense
  •  Types of honeypots and virtual private networks (VPNs)
  •  Security incident and event management (SIEM)

6. Virtualization and Cloud Computing:

  • Key concepts of virtualization and OS virtualization security
  • Cloud computing fundamentals and cloud deployment models
  • Cloud security best practices

7. Wireless Network Security:

  • Fundamentals of wireless networks and encryption mechanisms
  • Wireless network authentication methods
  • Implementing wireless network security measures

8. Mobile Device Security:

  • Mobile device connection methods and management
  • Mobile use approaches in enterprises
  • Security risks and guidelines associated with enterprise mobile usage policies
  • Implement various enterprise-level mobile security management solutions
  • Best practices on mobile platforms

9. IoT Device Security:

  • IoT devices, application areas, and communication models
  • How security works in IoT-enabled environments

10. Cryptography and PKI

  • Cryptographic tools, security techniques, and algorithms
  • Public key infrastructure (PKI) to authenticate users and devices in the digital world

11. Data Security:

  • Data security and its importance
  • Security controls for data encryption
  • Perform data backup and retention
  • Implement data loss prevention concepts

12. Network Traffic Monitoring

  • Network traffic monitoring concepts.
  • Traffic signatures for normal and suspicious network traffic.
  • Perform network monitoring to detect suspicious traffic.

Tools you will learn and use: 

Docker Bench for security, AWS, Miradore MDM, HashCalc, MD5 calculator, HashMyFiles, VeraCrypt, Data Recovery Wizard, and Wireshark