Most popular programs
Trending now
5,643 already enrolled!
Network security plays a vital role in most organizations. It is the process of preventing and detecting unauthorized use of an organization’s networking infrastructure. Network Defense Essentials (NDE) is a security program covering the fundamental concepts of network security. It equips students with the skills required to identify the increasing network security threats that reflect on the organization's security posture and implement general security controls to protect the underlying networking infrastructure from unauthorized access, modification, destruction, or disclosure.
This program will give a holistic overview of the key components of network security. It provides a solid fundamental knowledge required for a career in network security.
Why is NDE Important?
§ It facilitates your entry into the world of network security
§ It provides a professional understanding of the concepts of network security
§ It provides best practices to improve organizational security posture
§ It enhances your skills as a Network Security Specialist and increases your employability
This program is ideal for IT professionals who are seeking to foray into the exciting world of cybersecurity. Cybersecurity enthusiasts and students will readily find the program interesting, challenging, and useful.
Students going through NDE training will learn:
§ Key issues plaguing the network security
§ Essential network security protocols
§ Identification, authentication, and authorization concepts
§ Administrative security controls (Frameworks, laws, acts, and security policies)
§ Physical security controls (Physical security controls, workplace security, and environmental controls)
§ Technical security controls (Network segmentation, firewall, IDS/IPS, honeypot, proxy server, VPN, SIEM, UBA, and anti-malware)
§ Fundamentals of virtualization, cloud computing, and cloud security
§ Wireless network fundamentals, wireless encryption, and security measures
§ Fundamentals of mobile and IoT devices and their security measures
§ Cryptography and PKI Concepts
§ Data security, data encryption, and data backup and data loss prevention techniques
§ Network traffic monitoring for suspicious traffic
Module 01: Network Security Fundamentals
This module provides insight into the network security fundamentals, such as network defense approaches, network security controls, network security protocols, etc.
Module 02: Identification, Authentication, and Authorization
This module provides an overview of various methods and techniques used for the identification, authentication, and authorization of users accessing critical assets and resources.
Module 03: Network Security Controls - Administrative Controls
This module addresses an administrative aspect of an organization’s network security.
Module 04: Network Security Controls - Physical Controls
This module explains the importance of physical security, various physical security controls, importance of workplace security, and various environmental controls.
Module 05: Network Security Controls - Technical Controls
This module provides an overview of various technical controls that help organizations in protecting their private networks and IT assets.
Module 06: Virtualization and Cloud Computing
This module provides an overview of virtualization and cloud computing concepts that help organizations securely store or process data on the cloud.
Module 07: Wireless Network Security
This module deals with network security for wireless networks in enterprises.
Module 08: Mobile Device Security
This module provides an overview of mobile device security risks and best practices for mobile platforms.
Module 09: IoT Device Security
The use of Internet of Things (IoT) devices in enterprise IT infrastructure has created a vast security perimeter. Attackers can easily compromise IoT endpoints. Understanding the security measures will help in securing IoT-enabled environments. This module provides an overview of IoT device security.
Module 10: Cryptography and PKI
This module provides a comprehensive understanding of different cryptosystems and algorithms, one-way hash functions, and public key infrastructures (PKIs). It also covers various tools used to encrypt sensitive data.
Module 11: Data Security
This module explains the importance of data and various techniques to protect data.
Module 12: Network Traffic Monitoring
Organizations need to perform network monitoring and analyze network traffic to identify suspicious activities across their networks. This module covers the concept of network traffic monitoring.
Who can take this course?
Unfortunately, learners residing in one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. edX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.
Who can take this course?
Unfortunately, learners residing in one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. edX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.