Network Security

Jonathan S. Weissman, RITx

Learn the process of network security, including intrusion detection, evidence collection, network auditing, and contingency planning against attacks.

In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks.

The issues and facilities available to both the intruder and data network administrator will also be examined to illustrate their effect.

You will learn the principles and concepts of wired and wireless data network security. You will be guided through a series of laboratories and experiments in order to explore various mechanisms for securing data networks including physical layer mechanisms, filters, applications and encryption.

You will analyze attack/defend scenarios and determine the effectiveness of particular defense deployments against attacks.

This course is a part of the RITx Cybersecurity MicroMasters Program.

What will you learn

  • How to identify when attacks are happening inside networks
  • How to collect evidence of network intrusions
  • How to test networks and systems for vulnerabilities
  • How to prepare for and defend against network attacks

会期:
  • 2020年1月07日
介绍:
  • 免费:
  • 收费:
  • 证书:
  • MOOC:
  • 视频讲座:
  • 音频讲座:
  • Email-课程:
  • 语言: 英语 Gb

反馈

目前这个课程还没有反馈。您想要留第一个反馈吗?

请注册, 为了写反馈

Show?id=n3eliycplgk&bids=695438
NVIDIA
还有这个题目的:
B03575b5-7391-4a0a-bb96-8890a0c9a3bd-32b4a5e91fce.small Microsoft Professional Capstone : Cybersecurity
Put your enterprise security skills to the test while detecting, protecting...
Bb90d02a-a562-4632-a0af-e72987f27fea-22287e663ac6.small Cybersecurity Fundamentals
Learn cybersecurity fundamentals, including how to detect threats, protect systems...
05fa3fc6-a169-41aa-a67c-3985abf7db0b-519460bbae41.small Cybersecurity Capstone
Demonstrate the knowledge and skills acquired in the Cybersecurity MicroMasters...
Regular_10232247-5f42-483f-86db-d139b29e8cca Basics of Network Security
Explore the basic concepts of networks and network security and the tools used...
Aea32c0b-0d17-4ead-8996-a880b32aa433-529ba46a886d.small Cybersecurity and Privacy in the IoT (COMING 2020)
Learn about the security and privacy implications of the IoT and how to design...
还有标题«计算机科学»:
695ff980-b45a-425f-bee6-51bf6e962d90-de2d1a1c22e0.small Video Game Design History
Learn about the evolution of video games from experts at The Strong National...
595aa0b6-077d-439b-a651-95a9ee65c51a-fc966dc2648f.small Video Game Design and Balance
Learn about the video game design process and experiment with effective methods...
Fcd236ea-68ae-46f7-b991-849a41cebc64-0ea84acf6bad.small Video Game Asset Creation and Process
Learn about the tools, processes and platforms that allow video game assets...
Regular_7e290d30-8e84-46b2-bf50-801246fb157c Advanced Data Mining with Weka
Learn how to use popular packages that extend Weka's functionality and areas...
Regular_0b883f52-bc27-40f6-b633-d5fa9dd1101a Prepare to Run a Code Club
Build your confidence and get practical advice on launching and running a Code...
还有edX:
4178fda1-e8c7-476c-81e8-8a6b453a6a76-569208c21635.small Humanitarian Response to Conflict and Disaster
Learn the principles guiding humanitarian response to modern emergencies, and...
695ff980-b45a-425f-bee6-51bf6e962d90-de2d1a1c22e0.small Video Game Design History
Learn about the evolution of video games from experts at The Strong National...
595aa0b6-077d-439b-a651-95a9ee65c51a-fc966dc2648f.small Video Game Design and Balance
Learn about the video game design process and experiment with effective methods...
Fcd236ea-68ae-46f7-b991-849a41cebc64-0ea84acf6bad.small Video Game Asset Creation and Process
Learn about the tools, processes and platforms that allow video game assets...
A3940ac0-0757-4181-8b9d-5741f8a934fc-87e2da858ee6.small Minds and Machines
An introduction to philosophy of mind, exploring consciousness, reality, AI...

© 2013-2019