Introduction to Network Security
About this Course
The security of computer networks is a key element in cyber security. Computer networking provides the foundational connectivity services that are used for the world wide web, distributed computer applications and services, operations and manufacturing, and national infrastructure. This course provides understanding of key technologies used in computer networks and infrastructure. This includes protocols, computer networks, data centres, operational technologies that form key infrastructure critical to the success of organisations and services from a local to an international scale. The course discusses vulnerabilities and the exploits that target computer networks, systems, and the Internet infrastructure. By the end of this course learners will be able to: 1. Show a systematic understanding of digital networks and their operation, including the OSI 7 layer architecture and the TCP/IP protocol stack. 2. Discuss key security threats and risks faced in computer networks. 3. Demonstrate a critical understanding of network security architecture and design rationale of selected protocols, security technologies and how they are used in practice. 4. Identify attack models and analyse vulnerabilities in protocols, network systems, and applications. 5. Demonstrate how these vulnerabilities may be exploited in practice to penetrate a system.Created by: University of London

Related Online Courses
How did life emerge on Earth? How have life and Earth co-evolved through geological time? Is life elsewhere in the universe? Take a look through the 4-billion-year history of life on Earth through... more
This specialization is designed to equip students with the basic concepts and vocabulary of immunology. The goal is to provide students from different backgrounds with a fundamental understanding... more
When you hand in work in a professional workspace, employers expect it to be good quality work and done in a timely manner. By taking this short course you will learn about consistency and how to... more
In this course, we look at how to manage a system with the Linux operating system installed. The course material is a good for anyone preparing for the Linux Foundation Certified IT Associate... more
Getting data into your statistical analysis system can be one of the most challenging parts of any data science project. Data must be imported and harmonized into a coherent format before any... more