YoVDO

Akamai Network Engineering

Offered By: Coursera

Tags

Computer Networking Courses Operating Systems Courses Relational Databases Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Are you interested in learning how large global network operations work? Does managing 30% of the internet traffic globally intrigue you? Then the Network Engineering certification is for you. The NOCC is a proactive monitoring and troubleshooting team that monitors and manages globally distributed servers and resolves network bottlenecks in real time. This beginner level certificate is designed to provide you with in-demand skills that range from internet technology fundamentals, networking, operating systems and problem solving techniques. This certificate program consists of 5-courses, developed by Akamai, that are self-paced and can be completed over 5-months. The courses will help you build solid technical foundations and troubleshooting skills that align to entry level jobs in the Network Engineering field. Target Jobs: Network Engineering & Network Operations Support Roles

Syllabus

Course 1: Operating Systems Fundamentals
- Offered by Akamai Technologies, Inc.. Covers all basic functions in Linux. Students first learn about Linux distributions and Copyleft. Then ... Enroll for free.

Course 2: Networking Fundamentals
- Offered by Akamai Technologies, Inc.. Students start by learning basic network theory and terminology including network components, node ... Enroll for free.

Course 3: Managing Relational Databases
- Offered by Akamai Technologies, Inc.. Students will learn about the structure and design of relational databases including primary and ... Enroll for free.

Course 4: Python Scripting Fundamentals
- Offered by Akamai Technologies, Inc.. Students will start with a brief discussion of the programming process and the history of Python, ... Enroll for free.

Course 5: Introduction to IT Security
- Offered by Akamai Technologies, Inc.. Students will learn about the security management process. They will examine risk and risk management, ... Enroll for free.


Courses

  • 0 reviews

    1 day 6 hours 26 minutes

    View details
    Covers all basic functions in Linux. Students first learn about Linux distributions and Copyleft. Then they learn to use shell commands to query the system for basic information and to get help from the operating system. The course covers Linux file systems, including managing disks and directories, working with absolute and relative paths, and how to organize, backup and restore files. Students learn to work with text files from the shell and use expressions to search files, directories and file contents. Students also learn about managing users and groups including passwords and user profiles. Students use security principles to set permissions and ownership. Finally, students learn to manage jobs, processes, the boot process, and system settings including SELinux. Students will build their own Linux machine using virtualization and use the machine for all labs. At the end of the course, students will complete a capstone project to demonstrate mastery of course material.
  • 0 reviews

    22 hours 57 minutes

    View details
    Students will learn about the security management process. They will examine risk and risk management, including quantitative and qualitative risk assessments. The course includes discussion of security control types and physical security controls. Students will explore all aspects of Identity and Access Management (IAM) including single-factor and multi-factor authentication, account and access control, single sign-on and federation. Students will learn to harden endpoint devices including mobile and IoT devices. Students explore cryptography including symmetric and asymmetric encryption, hashing and digital signatures, and using Public Key Infrastructure (PKI) to create and manage certificates. Students explore network security including defense in depth, firewalls, IDS/IPS, wireless security, remote access, and cloud computing. Students explore vulnerability management, ethical hacking, and compliance. Then they learn about attackers, social engineering, malware, software/network attacks, wireless and password attacks. Students learn about incident response, forensics, and planning for business continuity. Labs encourage students to apply security concepts to their personal lives, practice applying security to networks, and even include hacking and forensic simulations. At the end of the course, students will complete a capstone project to demonstrate mastery of course objectives and use for personal branding.
  • 0 reviews

    17 hours 43 minutes

    View details
    Students will learn about the structure and design of relational databases including primary and foreign key fields, one-to-many and one-to-one relationships. Students will learn about the Structured Query Language (SQL) and use SQL to examine the database structure. They will also learn to create and manage databases, tables, and records. The focus of the course is on data analysis. Students will start with basic SQL queries then learn to add conditional statements, and logical, comparison and arithmetic operators. Students will learn to query for a range of values, and to use pattern matching and regular expressions. Then they will progress to using multiple conditions, and complex criteria, adding functions to create calculated fields, retrieve unique records and aggregate data. Then students will learn to query multiple tables using joins, creating complex queries using subqueries, nested subqueries, and subqueries in the WHERE and FROM clauses. Students will use SQL to control the output of data including parsing text and numbers, grouping results and using ROLLUP. Students will perform labs that give practical experience and then they will complete a capstone project to demonstrate mastery of course objectives.
  • 0 reviews

    1 day 2 hours 10 minutes

    View details
    Students start by learning basic network theory and terminology including network components, node functions, types of networks and network models. Students will gain an understanding of the Open Systems Interconnection (OSI) model and the TCP/IP Model including encapsulation and common network protocols. Students learn about data transmission methods and ethernet including CSMA/CD and CSMA/CA. The course covers wired and wireless networking standards, and networking hardware including switches and routers. Students will gain a thorough understanding of TCP/IP including binary numbers, CIDR notation, ANDing, and configuring routes in a network using routers and NAT routers. Students learn to configure DHCP and DNS, and then examine regulating traffic between network zones including implementing a DMZ, and using IDS/IPS technology, and configuring VPNs. The course includes a thorough discussion of troubleshooting wired and wireless networks including using packet sniffers. Students will use software that will allow them to simulate sophisticated networks to achieve practical experience. The course ends with a capstone that students will complete to demonstrate mastery of course objectives.
  • 0 reviews

    1 day 9 hours 14 minutes

    View details
    Students will start with a brief discussion of the programming process and the history of Python, including fundamental rules for authoring Python code and Python syntax. Students will learn about variables, data types, functions, and arithmetic operators. Then they will master core concepts including using conditional statements, logical operators, identity operators, and loops. They will learn to use complex variable types including lists, tuples, sets, ranges and dictionaries. They will write code to process sequences, use nested sequences, and add loop control. Students will learn to structure code for reuse including defining, and calling their own functions, as well as returning data. They will learn to use Python to interact with files and directories, databases, and to create dynamic web content and handle web form data. Students will complete labs to develop four applications from scratch: an age calculator, a word guessing game, a lemonade stand game, and a text-based adventure game. Then students will complete a capstone project to demonstrate mastery of course objectives that includes writing the code to connect a web site to a backend database with code that creates uses, authenticates logins, and displays dynamic content.

Taught by

Shadow Farrell

Related Courses

Becoming Familiar with SUSE Linux Enterprise
A Cloud Guru
Akamai Customer Consulting and Support
Coursera
Operating Systems Fundamentals
Akamai via Coursera
Asegurar los recursos de VPC con grupos de seguridad (Español LATAM) | Securing VPC Resources with Security Groups (LATAM Spanish)
Amazon Web Services via AWS Skill Builder
Aspectos básicos de la asistencia técnica
Crece con Google via Coursera