The Network Defense Essentials (NDE) : Hands-On Edition course focuses on network security and defense strategies.

Network Defense Essentials: Hands-On Edition
本课程是 Information Security Analyst 专业证书 的一部分

位教师:EC-Council
包含在 中
您将学到什么
Fundamental concepts of network security
Wireless network fundamentals, types of wireless encryption, and security measures
Identification, authentication, and authorization
Cryptography techniques, cryptographic algorithms, and Public Key Infrastructure (PKI)
您将获得的技能
- Network Monitoring
- Encryption
- Security Controls
- Information Assurance
- Cryptography
- Data Security
- Internet Of Things
- Authentications
- Threat Detection
- Identity and Access Management
- Public Key Infrastructure
- Cybersecurity
- Intrusion Detection and Prevention
- Cloud Security
- Authorization (Computing)
- Wireless Networks
- Network Security
您将学习的工具
要了解的详细信息

添加到您的领英档案
87 项作业
了解顶级公司的员工如何掌握热门技能

积累 Security 领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 通过 EC-Council 获得可共享的职业证书

该课程共有12个模块
With the increase in the usage of emerging technology, it has become increasingly important to secure information and data being processed online. As the Internet and computer networks are continually growing, network security has become a challenging task for organizations. This module provides insight into the network security fundamentals, such as network defense approaches, network security controls, network security protocols, etc.
涵盖的内容
8个视频7个作业
8个视频• 总计82分钟
- Course Introduction• 15分钟
- Introduction• 2分钟
- Understanding the Goals of Network Defense• 14分钟
- Understanding Information Assurance (IA) Principles• 6分钟
- Understanding the Benefits and Challenges of Network Defense• 6分钟
- Overview of Different Types of Network Defense Approaches• 2分钟
- Understanding the Different Types of Network Security Controls• 9分钟
- Understanding the Different Network Security Protocols• 28分钟
7个作业• 总计80分钟
- Network Security Fundamentals• 20分钟
- Understanding the Goals of Network Defense• 10分钟
- Understanding Information Assurance (IA) Principles• 10分钟
- Understanding the Benefits and Challenges of Network Defense• 10分钟
- Overview of Different Types of Network Defense Approaches• 10分钟
- Understanding the Different Types of Network Security Controls• 10分钟
- Understanding the Different Network Security Protocols• 10分钟
The most serious risk that organizations are facing today is unauthorized access to sensitive data. To control such data breaches, organizations require strong identification, authentication, and authorization mechanisms to effectively manage access to critical assets and sensitive data. This module provides an overview of various methods and techniques used for the identification, authentication, and authorization of users accessing critical assets and resources.
涵盖的内容
7个视频7个作业1个应用程序项目
7个视频• 总计42分钟
- Introduction• 2分钟
- Understanding the Terminology, Principles, and Models of Access Control• 21分钟
- Understanding Identity and Access Management (IAM)• 5分钟
- Understanding User Access Management• 3分钟
- Overview of Different Types of Authentication• 7分钟
- Overview of Different Types of Authorization• 2分钟
- Understanding User Accounting• 3分钟
7个作业• 总计80分钟
- Identification, Authentication, and Authorization• 20分钟
- Understanding the Terminology, Principles, and Models of Access Control• 10分钟
- Understanding Identity and Access Management (IAM)• 10分钟
- Understanding User Access Management• 10分钟
- Overview of Different Types of Authentication• 10分钟
- Overview of Different Types of Authorization• 10分钟
- Understanding User Accounting• 10分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
Compliance, policies, and governance are integral to an information security program for any organization. An organization needs to comply with certain regulatory standards to run its businesses. At the same time, it must also have strong security policies and governance in order to fulfill regulatory standards. The current module addresses this administrative aspect of an organization’s network security.
涵盖的内容
7个视频7个作业1个应用程序项目
7个视频• 总计82分钟
- Introduction• 2分钟
- Understanding Why Organizations Need Compliance• 15分钟
- Understanding Various Regulatory Frameworks, Laws, and Acts• 20分钟
- Understanding the Need for and Characteristics of Good Security Policy• 11分钟
- Understanding How to Design and Develop Security Policies• 2分钟
- Overview of Different Types of Security Policies• 9分钟
- Understanding the Different Types of Security and Awareness Training• 21分钟
7个作业• 总计80分钟
- Network Security Controls - Administrative Controls• 20分钟
- Understanding Why Organizations Need Compliance• 10分钟
- Understanding Various Regulatory Frameworks, Laws, and Acts• 10分钟
- Understanding the Need for and Characteristics of Good Security Policy• 10分钟
- Understanding How to Design and Develop Security Policies• 10分钟
- Overview of Different Types of Security Policies• 10分钟
- Understanding the Different Types of Security and Awareness Training• 10分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
Physical security plays a major role in every organization. It entails the protection of critical information, network infrastructure, physical equipment and devices, facilities, personnel, etc. from environmental disasters, terrorism, vandalism, and theft. This module explains the importance of physical security, various physical security controls, importance of workplace security, and various environmental controls.
涵盖的内容
7个视频7个作业
7个视频• 总计87分钟
- Introduction• 2分钟
- Understanding the Importance of Physical Security• 4分钟
- Understanding the Physical Security Attack Vectors• 4分钟
- Understanding the Various Types of Physical Security Controls• 41分钟
- Understanding the Importance of Workplace Security• 20分钟
- Overview of Physical Security Policy• 3分钟
- Understanding the Various Environmental Controls• 13分钟
7个作业• 总计80分钟
- Network Security Controls - Physical Controls• 20分钟
- Understanding the Importance of Physical Security• 10分钟
- Understanding the Physical Security Attack Vectors• 10分钟
- Understanding the Various Types of Physical Security Controls• 10分钟
- Understanding the Importance of Workplace Security• 10分钟
- Overview of Physical Security Policy• 10分钟
- Understanding the Various Environmental Controls• 10分钟
The most important aspect of security controls is the protection of organizational assets such as people, property, and data. By establishing security controls, an organization can either reduce or completely mitigate risks to their assets. This module provides an overview of various technical controls that help organizations in protecting their private networks and IT assets.
涵盖的内容
9个视频9个作业1个应用程序项目
9个视频• 总计195分钟
- Introduction• 2分钟
- Understanding Network Segmentation and its Types• 28分钟
- Understanding the Different Types of Firewalls and their Roles• 45分钟
- Understanding the Different Types of IDS/IPS and their Roles• 43分钟
- Overview of Different Types of Honeypots• 6分钟
- Understanding the Different Types of Proxy Servers and their Benefits• 17分钟
- Understanding the Fundamentals of Virtual Private Networks (VPNs) and their Importance in Network Security• 38分钟
- Overview of Security Incident and Event Management (SIEM) and User Behavior Analytics (UBA)• 12分钟
- Overview of Various Antivirus/Anti-malware Software• 3分钟
9个作业• 总计100分钟
- Network Security Controls - Technical Controls• 20分钟
- Understanding Network Segmentation and its Types• 10分钟
- Understanding the Different Types of Firewalls and their Roles• 10分钟
- Understanding the Different Types of IDS/IPS and their Roles• 10分钟
- Overview of Different Types of Honeypots• 10分钟
- Understanding the Different Types of Proxy Servers and their Benefits• 10分钟
- Understanding the Fundamentals of Virtual Private Networks (VPNs) and their Importance in Network Security• 10分钟
- Overview of Security Incident and Event Management (SIEM) and User Behavior Analytics (UBA)• 10分钟
- Overview of Various Antivirus/Anti-malware Software• 10分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
Cloud computing is an emerging technology that delivers computing services such as online business applications, online data storage, and webmail over the Internet. Cloud implementation enables a distributed workforce, reduces organization expenses, provides data security, etc. This module provides an overview of virtualization and cloud computing concepts that help organizations securely store or process data on the cloud.
涵盖的内容
8个视频8个作业1个应用程序项目
8个视频• 总计89分钟
- Introduction• 1分钟
- Understanding Virtualization, its Components, and Virtualization Enablers• 10分钟
- Understanding OS Virtualization Security and Concerns• 26分钟
- Understanding the Best Practices for OS Virtualization Security• 6分钟
- Understanding Cloud Computing and its Benefits• 5分钟
- Overview of Different Types of Cloud Computing Services• 5分钟
- Overview of Cloud Deployment Models• 8分钟
- Understanding Importance of Cloud Security and its Best Practices• 28分钟
8个作业• 总计90分钟
- Virtualization and Cloud Computing• 20分钟
- Understanding Virtualization, its Components, and Virtualization Enablers• 10分钟
- Understanding OS Virtualization Security and Concerns• 10分钟
- Understanding the Best Practices for OS Virtualization Security• 10分钟
- Understanding Cloud Computing and its Benefits• 10分钟
- Overview of Different Types of Cloud Computing Services• 10分钟
- Overview of Cloud Deployment Models• 10分钟
- Understanding Importance of Cloud Security and its Best Practices• 10分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
This module deals with network security for wireless networks in enterprises. Wireless networks are widely used across organizations today and are prone to various attacks. Therefore, organizations need to focus on the planning for securing the wireless network across the organization.
涵盖的内容
7个视频7个作业1个应用程序项目
7个视频• 总计54分钟
- Introduction• 1分钟
- Understanding the Wireless Terminology, Wireless Networks, and Wireless Standards• 16分钟
- Understanding the Wireless Network Topologies and Classification of Wireless Networks• 5分钟
- Understanding the Components of a Wireless Network• 6分钟
- Overview of Wireless Network Encryption Mechanisms• 11分钟
- Understanding the Different Types of Wireless Network Authentication Methods• 3分钟
- Understanding Wireless Network Security Measures and Wireless Security Tools• 12分钟
7个作业• 总计80分钟
- Wireless Network Security• 20分钟
- Understanding the Wireless Terminology, Wireless Networks, and Wireless Standards• 10分钟
- Understanding the Wireless Network Topologies and Classification of Wireless Networks• 10分钟
- Understanding the Components of a Wireless Network• 10分钟
- Overview of Wireless Network Encryption Mechanisms• 10分钟
- Understanding the Different Types of Wireless Network Authentication Methods• 10分钟
- Understanding Wireless Network Security Measures and Wireless Security Tools• 10分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
With the introduction of mobile phones in enterprises, enterprise security has become more complex. Enterprise mobile security has become a major challenge for organizations. Therefore, it is important for organizations to address these security concerns to effectively manage the security of mobile devices. This module provides an overview of mobile device security risks and best practices for mobile platforms.
涵盖的内容
7个视频7个作业1个应用程序项目
7个视频• 总计45分钟
- Introduction• 1分钟
- Understanding the Various Mobile Device Connection Methods• 5分钟
- Understanding the Concepts of Mobile Device Management• 6分钟
- Understanding the Common Mobile Use Approaches in Enterprises• 11分钟
- Understand the Security Risk and Guidelines Associated with Enterprises Mobile Usage Policies• 8分钟
- Understanding Enterprise-level Mobile Security Management Solutions• 7分钟
- Understanding the General Security Guidelines and Best Practices for Mobile Platforms• 7分钟
7个作业• 总计80分钟
- Mobile Device Security• 20分钟
- Understanding the Various Mobile Device Connection Methods• 10分钟
- Understanding the Concepts of Mobile Device Management• 10分钟
- Understanding the Common Mobile Use Approaches in Enterprises• 10分钟
- Understand the Security Risk and Guidelines Associated with Enterprises Mobile Usage Policies• 10分钟
- Understanding Enterprise-level Mobile Security Management Solutions• 10分钟
- Understanding the General Security Guidelines and Best Practices for Mobile Platforms• 10分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
The use of Internet of Things (IoT) devices in enterprise IT infrastructure has created a vast security perimeter. IoT devices use both networks and the cloud. However, they are highly vulnerable to malware, ransomware, and botnet attacks. Attackers can easily compromise IoT endpoints. Understanding the security measures will help in securing IoT-enabled environments. This module provides an overview of IoT device security.
涵盖的内容
8个视频8个作业1个应用程序项目
8个视频• 总计47分钟
- Introduction• 2分钟
- Understanding the IoT and Why Organizations Opt for IoT-enabled Environments• 7分钟
- Overview of IoT Application Areas and IoT Devices• 9分钟
- Understanding the IoT Architecture and IoT Communication Models• 15分钟
- Understanding the Security in IoT-Enabled Environments• 7分钟
- Understanding the Security Considerations of the IoT Framework• 2分钟
- Overview of IoT Device Management• 1分钟
- Understanding the Best Practices and Tools for IoT Security• 4分钟
8个作业• 总计90分钟
- IoT Device Security• 20分钟
- Understanding the IoT and Why Organizations Opt for IoT-enabled Environments• 10分钟
- Overview of IoT Application Areas and IoT Devices• 10分钟
- Understanding the IoT Architecture and IoT Communication Models• 10分钟
- Understanding the Security in IoT-Enabled Environments• 10分钟
- Understanding the Security Considerations of the IoT Framework• 10分钟
- Overview of IoT Device Management• 10分钟
- Understanding the Best Practices and Tools for IoT Security• 10分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
Cryptography and cryptographic (“crypto”) systems help in securing data against interception and compromise during online transmissions. This module provides a comprehensive understanding of different cryptosystems and algorithms, one-way hash functions, and public key infrastructures (PKIs). It also covers various tools used to encrypt sensitive data.
涵盖的内容
6个视频6个作业1个应用程序项目
6个视频• 总计50分钟
- Introduction• 1分钟
- Understanding Cryptographic Techniques• 11分钟
- Understanding the Different Encryption Algorithms• 9分钟
- Understanding the Different Hashing Algorithms• 7分钟
- Overview of Different Cryptography Tools and Hash Calculators• 3分钟
- Understanding Public Key Infrastructure (PKI), Digital Signatures and Digital Certificates• 18分钟
6个作业• 总计70分钟
- Cryptography and PKI• 20分钟
- Understanding Cryptographic Techniques• 10分钟
- Understanding the Different Encryption Algorithms• 10分钟
- Understanding the Different Hashing Algorithms• 10分钟
- Overview of Different Cryptography Tools and Hash Calculators• 10分钟
- Understanding Public Key Infrastructure (PKI), Digital Signatures and Digital Certificates• 10分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
Data breaches can be costly for organizations. Therefore, it is important to keep organization data safe from prying eyes. This module explains the importance of data, and various techniques to protect data.
涵盖的内容
7个视频7个作业1个应用程序项目
7个视频• 总计84分钟
- Introduction• 1分钟
- Understanding Data Security and its Importance• 9分钟
- Understanding the Different Data Security Technologies• 4分钟
- Understanding the Various Security Controls for Data Encryption• 3分钟
- Overview of Disk Encryption, File Encryption, and Removable-media Encryption Tools• 8分钟
- Understanding the Methods and Tools for Data Backup and Retention• 53分钟
- Understanding the Data Loss Prevention (DLP) and DLP Solutions• 5分钟
7个作业• 总计80分钟
- Data Security• 20分钟
- Understanding Data Security and its Importance• 10分钟
- Understanding the Different Data Security Technologies• 10分钟
- Understanding the Various Security Controls for Data Encryption• 10分钟
- Overview of Disk Encryption, File Encryption, and Removable-media Encryption Tools• 10分钟
- Understanding the Methods and Tools for Data Backup and Retention• 10分钟
- Understanding the Data Loss Prevention (DLP) and DLP Solutions• 10分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
Organizations need to perform network monitoring and analyze network traffic to identify suspicious activities across their networks. This module covers the concept of network traffic monitoring.
涵盖的内容
7个视频7个作业2个应用程序项目
7个视频• 总计28分钟
- Introduction• 2分钟
- Understanding the Need for and Advantages of Network Traffic Monitoring• 4分钟
- Understanding the Network Traffic Signatures• 4分钟
- Understanding the Categories of Suspicious Traffic Signatures• 2分钟
- Overview of Attack Signature Analysis Techniques• 2分钟
- Understanding Network Monitoring for Suspicious Traffic• 12分钟
- Overview of Various Network Monitoring Tools• 2分钟
7个作业• 总计80分钟
- Network Traffic Monitoring• 20分钟
- Understanding the Need for and Advantages of Network Traffic Monitoring• 10分钟
- Understanding the Network Traffic Signatures• 10分钟
- Understanding the Categories of Suspicious Traffic Signatures• 10分钟
- Overview of Attack Signature Analysis Techniques• 10分钟
- Understanding Network Monitoring for Suspicious Traffic• 10分钟
- Overview of Various Network Monitoring Tools• 10分钟
2个应用程序项目• 总计120分钟
- Practice Lab• 60分钟
- Capstone• 60分钟
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
位教师

提供方

提供方

Best known for the Certified Ethical Hacker program, EC-Council builds individual and team/organization cyber capabilities through the Certified Ethical Hacker Program and other programs including Certified Secure Computer User, Computer Hacking Forensic Investigator, Certified Security Analyst, Certified Network Defender, Certified SOC Analyst, Certified Threat Intelligence Analyst, Certified Incident Handler, as well as the Certified Chief Information Security Officer.
从 Security 浏览更多内容
EEC-Council
课程
CCisco Learning and Certifications
课程
LLearnKartS
课程
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
常见问题
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is currently available only to learners who have paid or received financial aid, when available.
更多问题
提供助学金,


