Network and Security Foundations
About this Course
As computer systems become smaller, cheaper, and more readily accessible, it seems everyone is connected at the touch of a button. Organizations struggle to remain efficient as they manage growing numbers of single-user computer systems. These systems require interconnectivity to exchange data, share resources, and access more powerful computers for tasks too complicated for local computers to process. All of these activities require computing devices to access multiple networks. This course introduces networks such as the local area network (LAN), the enterprise network, the campus area network (CAN), the metropolitan area network (MAN), metro Ethernet, the personal area network (PAN), the virtual private network (VPN), and the wide area network (WAN). The course discusses the essentials for implementing modern computer networks. Each lesson goes through the various networking technologies. The course introduces the concepts and practices associated with network security vulnerabilities, threats, risk mitigation, and the policies and procedures associated with security management.Created by: Western Governors University
Level: Introductory

Related Online Courses
About the Database Series of Courses "Databases" was one of Stanford's three inaugural massive open online courses in the fall of 2011. It has been offered in synchronous and then in self-paced... more
Please Note: Learners who successfully complete this IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in thi... more
The modern data analysis pipeline involves collection, preprocessing, storage, analysis, and interactive visualization of data. The goal of this course, part of the Analytics: Essential Tools and... more
We will now turn our attention to the consoles of the eighth and ninth generations and learn about advances in computer gaming and related gaming technologies, including a decline in physical game... more
In this course, we build upon the knowledge we built up so far on cache side-channel attacks as well as the side-channel and security mindset. We will then go beyond software-based side-channel... more