- Platform
- edX
- Provider
- Rochester Institute of Technology
- Effort
- 10-12 hours/week
- Length
- 8 weeks
- Language
- English
- Credentials
- Paid Certificate Available
- Part of
- Course Link
Overview
In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks.
The issues and facilities available to both the intruder and data network administrator will also be examined to illustrate their effect.
You will learn the principles and concepts of wired and wireless data network security. You will be guided through a series of laboratories and experiments in order to explore various mechanisms for securing data networks including physical layer mechanisms, filters, applications and encryption.
You will analyze attack/defend scenarios and determine the effectiveness of particular defense deployments against attacks.
This course is a part of the RITx Cybersecurity MicroMasters Program.
What you'll learn
Taught by
Jonathan Weissman
In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks.
The issues and facilities available to both the intruder and data network administrator will also be examined to illustrate their effect.
You will learn the principles and concepts of wired and wireless data network security. You will be guided through a series of laboratories and experiments in order to explore various mechanisms for securing data networks including physical layer mechanisms, filters, applications and encryption.
You will analyze attack/defend scenarios and determine the effectiveness of particular defense deployments against attacks.
This course is a part of the RITx Cybersecurity MicroMasters Program.
What you'll learn
- How to identify when attacks are happening inside networks
- How to collect evidence of network intrusions
- How to test networks and systems for vulnerabilities
- How to prepare for and defend against network attacks
Syllabus
Unit 1: Packet Sniffing
Unit 2: Password Cracking
Unit 3: Port Scanning
Unit 4: Exploits and Exploiting
Unit 5: Access Control Lists
Unit 6: Snort
Unit 7: DHCP, DNS, and Switch Attacks and Mitigations
Unit 8: Man in The Middle Attacks and Mitigations
Unit 1: Packet Sniffing
Unit 2: Password Cracking
Unit 3: Port Scanning
Unit 4: Exploits and Exploiting
Unit 5: Access Control Lists
Unit 6: Snort
Unit 7: DHCP, DNS, and Switch Attacks and Mitigations
Unit 8: Man in The Middle Attacks and Mitigations
Taught by
Jonathan Weissman