Skip to main contentSkip to Xpert Chatbot

RITx: Network Security

4.8 stars
11 ratings

Learn the process of network security, including intrusion detection, evidence collection, network auditing, and contingency planning against attacks.

Network Security
8 weeks
10–12 hours per week
Instructor-paced
Instructor-led on a course schedule
Free
Optional upgrade available

There is one session available:

49,695 already enrolled! After a course session ends, it will be archivedOpens in a new tab.
Starts Jan 13, 2025
Ends Mar 12, 2025

About this course

Skip About this course

In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks.

The issues and facilities available to both the intruder and data network administrator will also be examined to illustrate their effect.

You will learn the principles and concepts of wired and wireless data network security. You will be guided through a series of laboratories and experiments in order to explore various mechanisms for securing data networks including physical layer mechanisms, filters, applications and encryption.

You will analyze attack/defend scenarios and determine the effectiveness of particular defense deployments against attacks.

This course is a part of the RITx Cybersecurity MicroMasters Program.

At a glance

  • Language: English
  • Video Transcript: English
  • Associated programs:
  • Associated skills:Auditing, Contingency Planning, Physical Layers, Cyber Security, Evidence Collection, Network Security, Intrusion Detection And Prevention, Computer Networks

What you'll learn

Skip What you'll learn
  • How to identify when attacks are happening inside networks
  • How to collect evidence of network intrusions
  • How to test networks and systems for vulnerabilities
  • How to prepare for and defend against network attacks

Unit 1: Packet Sniffing

Unit 2: Password Cracking

Unit 3: Port Scanning

Unit 4: Exploits and Exploiting

Unit 5: Access Control Lists

Unit 6: Snort

Unit 7: DHCP, DNS, and Switch Attacks and Mitigations

Unit 8: Man in The Middle Attacks and Mitigations

Who can take this course?

Unfortunately, learners residing in one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. edX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.

This course is part of Cybersecurity MicroMasters Program

Learn more 
Expert instruction
4 graduate-level courses
Instructor-led
Assignments and exams have specific due dates
8 months
10 - 12 hours per week

Interested in this course for your business or team?

Train your employees in the most in-demand topics, with edX For Business.