Advanced Cyber Security Training: Network Security
Offered By: EC-Council via FutureLearn
Course Description
Overview
Understand the importance of network security
Cyber attacks on your business or home network can have devastating results. This four-week course will give you the knowledge and skills to identify and prevent these attacks, as well as helping you increase your network security.
Using a practical approach to cyber security, you’ll learn how to deal with the growing problem of network attacks and understand how malicious hackers could break into your network.
Learn how to identify types of network attacks
On this course, you’ll build your understanding of network security and how to deal with disaster recovery, should a network attack happen.
You’ll start with an introductionto the different types of attackers and network attacks that occur, including phishing, spear phishing, DDOS, and ransomware.
You’ll also learn vital techniques to help you recover from an attack.
Conduct threat assessment scanning and learn how to use security tools
Having understood the theory of network attacks, you’ll use a hands-on approach to strengthen your knowledge.
You’ll discover and use the tools needed to conduct threat assessment scanning including Nmap, Spiderfoot, OpenVas and Nessus.
You’ll also understand how to carry out a penetration test using ExploitDB.
Learn how to use OSINT and how to secure your network
Using OSINT tools (open-source intelligence), you’ll learn how to gather intelligence on the attacker, allowing you to narrow down potential vulnerabilities and understand how hackers recon your network.
These transferable cyber security skills can then be used to increase the security in your network, making it a harder target for potential attackers.
This course offers a comprehensive guide to network security with video walk-throughs, making it suitable for both beginners and experienced users.
You don’t need any prior knowledge to join.
Syllabus
- Is My Network Really Under Attack?
- Welcome to Network Security
- Introduction to Network Threats
- How a Malicious Hacker Goes About Breaking into Your Network: Physical Attacks and Man in the Middle Attacks
- How a Malicious Hacker Goes About Breaking into Your Network: Social Engineering
- Week 1 Summary
- How to Securing Your Network from Within
- Welcome to Week 2!
- Securing Your Network Through Your Users
- Securing Your Machine: Common Ways in for Hackers
- Securing Your Machine: Changes You Should Make
- Week 2 Summary
- Network Monitoring and Preventative Measures Against Phishing
- Welcome to Week 3!
- Logs and Auditing: Monitoring Software
- Logs and Auditing: IP Addresses
- Phishing and Spear Phishing
- Week 3 Summary
- How to Test Your Network and Recover from Attacks
- The Final Week Ahead
- Red Team and Blue Team Approach
- Tracking a Hacker (OSINT)
- Recovering from an Attack
- Week 4 Summary
Taught by
EC-Council Educator Team
Related Courses
Certified Ethical Hacking (v12)LearnKartS via Coursera An Introduction to Ethical Hacking with Kali Linux
Packt via Coursera Getting Started in Port Scanning Using Nmap and Kali Linux
Packt via Coursera Intermediate Ethical Hacking Hands-on Training
Packt via Coursera Intermediate Ethical Hacking Techniques
Packt via Coursera