Course Highlights
  • Describe the threats to data from information communication technology (ICT)
  • Identify the issues and practices associated with managing network security
  • Identify the practices, tools, and methodologies associated with assessing network security
  • Describe the components of an effective network security program
Curriculum

3 Topics
Welcome to the course Managing Network Security
Managing Network Security
Get help and meet other learners. Join your Community!

7 Topics
Introduction to Networking
What is a network?
How networks communicate
Introduction to Network Protocols
TCP/IP and Ethernet Network Protocols
Securing Internet Services and the Web - Part 1
Securing Internet Services and the Web - Part 2

22 Topics
Introduction to Networking
Introduction to Networking
What is a network?
How networks communicate
Introduction to Network Protocols
TCP/IP and Ethernet Network Protocols
Securing Internet Services and the Web - Part 1
Securing Internet Services and the Web - Part 2
Cybersecurity Technology Administration
Firewall Administration – Firewall Selection
Firewall Administration – Firewall Configuration
IDPS Administration
VPN Administration
Cryptography and Network Security
Cybersecurity Technology Administration
Firewalls
Cybersecurity Technology Administration
Firewall Administration – Firewall Selection
Firewall Administration – Firewall Configuration
IDPS Administration
VPN Administration
Cryptography and Network Security

14 Topics
Wireless and Cloud Networks
What is a Wireless Network?
Wireless Standards and Protocols
What is Cloud networking and computing?
Cloud networking and cybersecurity
Additional Wireless Network Standards and Technologies
Wrap up for Wireless and Cloud Networks
Wireless Protocols
Wireless and Cloud Networks
What is a Wireless Network?
Wireless Standards and Protocols
What is Cloud networking and computing?
Cloud networking and cybersecurity
Additional Wireless Network Standards and Technologies

16 Topics
Cybersecurity Network Auditing Monitoring and Logging
Introduction to Auditing and Systems Monitoring
Auditing & Systems Monitoring Management – Part 1
Auditing & Systems Monitoring Management – Part 2
Formal Audits & Auditing
Digital Forensics & Auditing – Part 1
Digital Forensics & Auditing – Part 2
Wrap up for Cybersecurity Network Auditing Monitoring and Logging
Managing Digital Forensics
Managing Network Security
Introduction to Auditing and Systems Monitoring
Auditing & Systems Monitoring Management – Part 1
Auditing & Systems Monitoring Management – Part 2
Formal Audits & Auditing
Digital Forensics & Auditing – Part 1
Digital Forensics & Auditing – Part 2

2 Topics
Wrap up for the course Managing Network Security
Managing Network Security Course Examination

  Write a Review

Managing Network Security

Go to Free Course