YoVDO

Advanced Cyber Security Training: Network Security

Offered By: EC-Council via FutureLearn

Tags

Network Security Courses Penetration Testing Courses Nmap Courses Nessus Courses Network Monitoring Courses

Course Description

Overview

Understand the importance of network security

Cyber attacks on your business or home network can have devastating results. This four-week course will give you the knowledge and skills to identify and prevent these attacks, as well as helping you increase your network security.

Using a practical approach to cyber security, you’ll learn how to deal with the growing problem of network attacks and understand how malicious hackers could break into your network.

Learn how to identify types of network attacks

On this course, you’ll build your understanding of network security and how to deal with disaster recovery, should a network attack happen.

You’ll start with an introductionto the different types of attackers and network attacks that occur, including phishing, spear phishing, DDOS, and ransomware.

You’ll also learn vital techniques to help you recover from an attack.

Conduct threat assessment scanning and learn how to use security tools

Having understood the theory of network attacks, you’ll use a hands-on approach to strengthen your knowledge.

You’ll discover and use the tools needed to conduct threat assessment scanning including Nmap, Spiderfoot, OpenVas and Nessus.

You’ll also understand how to carry out a penetration test using ExploitDB.

Learn how to use OSINT and how to secure your network

Using OSINT tools (open-source intelligence), you’ll learn how to gather intelligence on the attacker, allowing you to narrow down potential vulnerabilities and understand how hackers recon your network.

These transferable cyber security skills can then be used to increase the security in your network, making it a harder target for potential attackers.

This course offers a comprehensive guide to network security with video walk-throughs, making it suitable for both beginners and experienced users.

You don’t need any prior knowledge to join.


Syllabus

  • Is My Network Really Under Attack?
    • Welcome to Network Security
    • Introduction to Network Threats
    • How a Malicious Hacker Goes About Breaking into Your Network: Physical Attacks and Man in the Middle Attacks
    • How a Malicious Hacker Goes About Breaking into Your Network: Social Engineering
    • Week 1 Summary
  • How to Securing Your Network from Within
    • Welcome to Week 2!
    • Securing Your Network Through Your Users
    • Securing Your Machine: Common Ways in for Hackers
    • Securing Your Machine: Changes You Should Make
    • Week 2 Summary
  • Network Monitoring and Preventative Measures Against Phishing
    • Welcome to Week 3!
    • Logs and Auditing: Monitoring Software
    • Logs and Auditing: IP Addresses
    • Phishing and Spear Phishing
    • Week 3 Summary
  • How to Test Your Network and Recover from Attacks
    • The Final Week Ahead
    • Red Team and Blue Team Approach
    • Tracking a Hacker (OSINT)
    • Recovering from an Attack
    • Week 4 Summary

Taught by

EC-Council Educator Team

Related Courses

Certified Ethical Hacking (v12)
LearnKartS via Coursera
An Introduction to Ethical Hacking with Kali Linux
Packt via Coursera
Getting Started in Port Scanning Using Nmap and Kali Linux
Packt via Coursera
Intermediate Ethical Hacking Hands-on Training
Packt via Coursera
Intermediate Ethical Hacking Techniques
Packt via Coursera