About this courseSkip About this course
This course gives you the background needed to understand basic types of network security. You will learn about computer networks including Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization and network security controls that guard an organization from cybersecurity attacks.
In addition to networking, you will learn about database vulnerabilities and the tools/knowledge needed to research a database vulnerability for a variety of databases including SQL Injection, Oracle, Mongo and Couch. You will learn about various security data types associated with databases and organizations that define standards and provide tools for cybersecurity professionals. Ultimately you will learn how to safeguard an organizations sensitive information against data loss from cyberattacks.
This course will give you a basic understanding of network security and sensitive data protection services or as part of the overall Cybersecurity basics professional certificate.
What you'll learnSkip What you'll learn
Understand network basics around the TCP/IP and OSI Models.
Describe the differences between IPS and IDS Systems.
Discuss Layer 2 and Layer 3 network addressing.
Describe how Ethernet networks work.
Understand IP addressing, network address translation and packet sniffing.
Describe application and transport protocols , UDP and TCP.
Describe DNS and DHCP servers.
Describe key characteristics of different data types and models.
Discuss different data structures.
Discuss options for protecting your data.
Module 1: TCP/IP Framework
In this module, you will learn about the TCP/IP Framework, Ethernet and Lan Networks, and the basics around routing and switching. You will also learn about address translation and the basic differences between Intrusion Detection and Intrusion Prevention Systems. Finally, you will learn about network packets.
Module 2: Basics of IP Addressing and the OSI Model
In this module, you will learn the basics of IP Addressing and how it affects the network traffic routing. You will about application and transport protocols. You will learn about firewalls and additional information in regards to Intrusion Detection and Intrusion prevention systems. Finally, you will learn the concepts of high availability and clustering.
Module 3: Introduction to Databases
In this module you will learn to define data source and model types as well as types of data. You will also review how to use best practices to secure your organizations data. Finally, you will get an in depth look at use cases around an example of a Data Protection solution, IBM Security Guardium.
Module 4: Deep Dive - Injection Vulnerability
In this module you will hear an IBM Subject Matter expert discuss the common vulnerability of Injection. You will learn the basics around OS Command Injection and SQL Injection.
Pursue a Verified Certificate to highlight the knowledge and skills you gain$149 USD
Official and Verified
Receive an instructor-signed certificate with the institution's logo to verify your achievement and increase your job prospects
Add the certificate to your CV or resume, or post it directly on LinkedIn
Give yourself an additional incentive to complete the course
Support our Mission
edX, a non-profit, relies on verified certificates to help fund free education for everyone globally