Network Defense Essentials covers the fundamental concepts of information security and network defense. This introductory cybersecurity course is designed for today's entry-level information security or cybersecurity careers and is ideal for learners aspiring to pursue a career in cybersecurity.
提供:
このコースについて
貴社では、従業員に需要のあるスキルを訓練させることによって利益を得ることができるでしょうか?
Coursera for Businessを試す学習内容
Fundamental concepts of network security
Wireless network fundamentals, types of wireless encryption, and security measures
Identification, authentication, and authorization
Cryptography techniques, cryptographic algorithms, and Public Key Infrastructure (PKI)
貴社では、従業員に需要のあるスキルを訓練させることによって利益を得ることができるでしょうか?
Coursera for Businessを試す提供:

EC-カウンシル
Best known for the Certified Ethical Hacker program, EC-Council builds individual and team/organization cyber capabilities through the Certified Ethical Hacker Program and other programs including Certified Secure Computer User, Computer Hacking Forensic Investigator, Certified Security Analyst, Certified Network Defender, Certified SOC Analyst, Certified Threat Intelligence Analyst, Certified Incident Handler, as well as the Certified Chief Information Security Officer.
シラバス - 本コースの学習内容
Module 01: Network Security Fundamentals
With the increase in the usage of emerging technology, it has become increasingly important to secure information and data being processed online. As the Internet and computer networks are continually growing, network security has become a challenging task for organizations. This module provides insight into the network security fundamentals, such as network defense approaches, network security controls, network security protocols, etc.
Module 02: Identification, Authentication, and Authorization
The most serious risk that organizations are facing today is unauthorized access to sensitive data. To control such data breaches, organizations require strong identification, authentication, and authorization mechanisms to effectively manage access to critical assets and sensitive data. This module provides an overview of various methods and techniques used for the identification, authentication, and authorization of users accessing critical assets and resources.
Module 03: Network Security Controls - Administrative Controls
Compliance, policies, and governance are integral to an information security program for any organization. An organization needs to comply with certain regulatory standards to run its businesses. At the same time, it must also have strong security policies and governance in order to fulfill regulatory standards. The current module addresses this administrative aspect of an organization’s network security.
Module 04: Network Security Controls - Physical Controls
Physical security plays a major role in every organization. It entails the protection of critical information, network infrastructure, physical equipment and devices, facilities, personnel, etc. from environmental disasters, terrorism, vandalism, and theft. This module explains the importance of physical security, various physical security controls, importance of workplace security, and various environmental controls.
Module 05: Network Security Controls - Technical Controls
The most important aspect of security controls is the protection of organizational assets such as people, property, and data. By establishing security controls, an organization can either reduce or completely mitigate risks to their assets. This module provides an overview of various technical controls that help organizations in protecting their private networks and IT assets.
Module 06: Virtualization and Cloud Computing
Cloud computing is an emerging technology that delivers computing services such as online business applications, online data storage, and webmail over the Internet. Cloud implementation enables a distributed workforce, reduces organization expenses, provides data security, etc. This module provides an overview of virtualization and cloud computing concepts that help organizations securely store or process data on the cloud.
Module 07: Wireless Network Security
This module deals with network security for wireless networks in enterprises. Wireless networks are widely used across organizations today and are prone to various attacks. Therefore, organizations need to focus on the planning for securing the wireless network across the organization.
Module 08: Mobile Device Security
With the introduction of mobile phones in enterprises, enterprise security has become more complex. Enterprise mobile security has become a major challenge for organizations. Therefore, it is important for organizations to address these security concerns to effectively manage the security of mobile devices. This module provides an overview of mobile device security risks and best practices for mobile platforms.
Module 09: IoT Device Security
The use of Internet of Things (IoT) devices in enterprise IT infrastructure has created a vast security perimeter. IoT devices use both networks and the cloud. However, they are highly vulnerable to malware, ransomware, and botnet attacks. Attackers can easily compromise IoT endpoints. Understanding the security measures will help in securing IoT-enabled environments. This module provides an overview of IoT device security.
Module 10: Cryptography and PKI
Cryptography and cryptographic (“crypto”) systems help in securing data against interception and compromise during online transmissions. This module provides a comprehensive understanding of different cryptosystems and algorithms, one-way hash functions, and public key infrastructures (PKIs). It also covers various tools used to encrypt sensitive data.
Module 11: Data Security
Data breaches can be costly for organizations. Therefore, it is important to keep organization data safe from prying eyes. This module explains the importance of data, and various techniques to protect data.
Module 12: Network Traffic Monitoring
Organizations need to perform network monitoring and analyze network traffic to identify suspicious activities across their networks. This module covers the concept of network traffic monitoring.
Cybersecurity Attack and Defense Fundamentals専門講座について
This Specialization can be taken by students, IT professionals, IT managers, career changers, and anyone who seeks a cybersecurity career or aspires to advance their current role. This course is ideal for those entering the cybersecurity workforce, providing foundational, hands-on skills to solve the most common security issues organizations face today.
This 3-course Specialization will help you gain core cybersecurity skills needed to protect critical data, networks, and digital assets. You will learn to build the foundation that enables individuals to grow their skills in specialized domains like penetration testing, security consulting, auditing, and system and network administration.

よくある質問
いつ講座や課題にアクセスできるようになりますか?
講義と課題へのアクセスは、登録のタイプによって異なります。聴講モードでコースを受講すると、ほとんどのコース教材を無料で見ることができます。採点された課題にアクセスして修了証を取得するには、聴講中または聴講後に、修了証エクスペリエンスを購入する必要があります。聴講オプションが表示されない場合:
コースは聴講オプションを提供していない可能性があります。代わりに無料トライアルをお試しいただくか、学資援助を申請することができます。
コースは、聴講オプションを提供せずに「修了証なしフルコース」オプションを提供する場合があります。このオプションでは、すべてのコース教材が表示され、必須の評価を提出して、最終成績を取得することができます。この場合、修了証エクスペリエンスは購入できません。
この専門講座をサブスクライブすると何を行うことができるようになりますか?
コースに登録する際、専門講座のすべてのコースにアクセスできます。コースの完了時には修了証を取得できます。電子修了証が成果のページに追加され、そこから修了証を印刷したり、LinkedInのプロフィールに追加したりできます。コースの内容の閲覧のみを希望する場合は、無料でコースを聴講できます。
返金ポリシーについて教えてください。
サブスクライブすると、7日間の無料トライアルを体験できます。この期間中は解約金なしでキャンセルできます。それ以降、払い戻しはありませんが、サブスクリプションをいつでもキャンセルできます。返金ポリシーをすべて表示します。
さらに質問がある場合は、受講者ヘルプセンターにアクセスしてください。