Brand Image
Loading ...

40 HOURS

HYBRID

ENGLISH

40 HOURS

HYBRID

ENGLISH

In the “Cybersecurity: Network Defense” course, you will embark on a journey to understand the vital aspects of cybersecurity, including how to defend systems and networks effectively. We cover a broad spectrum of topics such as access control, the functioning and application of firewalls, ensuring security in the cloud environment, and the practical applications of cryptography. Moreover, we delve into understanding network security data and how to evaluate security alerts proficiently. Throughout the course, you will have hands-on experiences that will empower you to set defensive measures in place, manage access controls, work with simulated firewalls, and make sense of various kinds of network data. By the end, you will be adept at assessing security alerts, equipped with the skills to be a line of defense in the ever-evolving landscape of cybersecurity.

At the end of this course, learners will be able to implement various aspects of system and network defense. They will also be skilled in configuring local and server-based access control. Furthermore, learners will be equipped to recommend cloud security requirements based on a given cloud scenario, and they will be proficient in using different types of logs and records to store information regarding hosts and the network.

  • Detecting Intrusions
  • Threat Monitoring and Analysis
  • Cybersecurity Officer
  • Cybersecurity Analyst
  • Network Analyst

At the end of this course, learners will be able to implement various aspects of system and network defense. They will also be skilled in configuring local and server-based access control. Furthermore, learners will be equipped to recommend cloud security requirements based on a given cloud scenario, and they will be proficient in using different types of logs and records to store information regarding hosts and the network.

  • Detecting Intrusions
  • Threat Monitoring and Analysis
  • Cybersecurity Officer
  • Cybersecurity Analyst
  • Network Analyst

Course Outline

Module 1: Understanding Defense

Module 2: System and Network Defense

Module 3: Access Control

Module 4: Access Control Lists

Module 5: Firewall Technologies

Module 6: Zone-Based Policy Firewalls

Module 7: Cloud Security

Module 8: Cryptography

Module 9: Technologies and Protocols

Module 10: Network Security Data

Module 11: Evaluating Alerts

Required Resources

Computer, 2GB RAM or higher, 8GB free disk space (Hardware); Oracle VirtualBox and virtual machine image file (Software); High-speed Internet Connection (Network)

Pre-Requisites

PC and internet navigation skills, basic Windows and Linux system concepts, basic understanding of computer networks, and binary and hexadecimal conversion; completed course Cybersecurity: Endpoint Security

Assessment

In this Cybersecurity: Endpoint Security course:

One (1) diagnostic assessment is available, to be conducted asynchronously, and will be knowledge-based, allowing learners to proceed at their own pace. It offers the flexibility for remote or on-site participation.

A performance-based formative assessment is to be offered, to be conducted synchronously, allowing learners to choose between remote or on-site participation.

A performance-based summative assessment is to be conducted synchronously, providing learners with the option of remote or on-site participation.

Credit and Recognition

Learners are eligible to take the CISCO Certification “Cybersecurity: Threat Management”, and the certification is globally recognized wherever Cisco and Cisco NetAcad are acknowledged.

The course is delivered in partnership with CISCO Networking Academy and aligns with CISCO-Certified Support Technician (CCST) Cybersecurity certification. To ensure the quality of this micro-credential, continuous feedback loops with students, instructors, and industry practitioners are maintained to continually improve content, delivery, and assessment methods.

Learning Pathways

Cybersecurity: Network Defense

Cybersecurity: Endpoint Security is a prerequisite for Cybersecurity: Network Defense. After mastering the fundamentals of endpoint security, you’ll be ready to delve deeper into network defense strategies as part of the Junior Cybersecurity Analyst Pathway.

Scroll to top

2018 2nd Quarter Beyond Borders

[news-letter-popupbox year='2018' quarter='2']

This will close in 0 seconds

2018 3rd Quarter Beyond Borders

[news-letter-popupbox year='2018' quarter='3']

This will close in 0 seconds

2018 4th Quarter Beyond Borders

[news-letter-popupbox year='2018' quarter='4']

This will close in 0 seconds

2019 1st Quarter Beyond Borders

[news-letter-popupbox year='2019' quarter='1']

This will close in 0 seconds

2019 2nd Quarter Beyond Borders

[news-letter-popupbox year='2019' quarter='2']

This will close in 0 seconds

2019 3rd Quarter Beyond Borders

[news-letter-popupbox year='2019' quarter='3']

This will close in 0 seconds

2019 4th Quarter Beyond Borders

[news-letter-popupbox year='2019' quarter='4']

This will close in 0 seconds

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.