Computer Networking - Digital Network Security - Revised
Gain a better understanding of network architecture, its protocols, and how to ensure stronger network security.
Take this certificate on your own.
Start now and learn at your own pace.
CertificationView course modules
The course begins by defining network infrastructure and network security. It then continues by describing the features and functions of the VPN protocol and the Point-to-Point Tunneling Protocol (PPTP). It will teach you how PPTP captures Point-To-Point (PPP) frames into IP datagrams for transmission over an IP-based network. You will also learn about L2TP and how it relies on IPSec in Transport Mode for encryption services. You will also look into how Firewalls protect a network from malicious attack and unwanted intrusion.
You will then learn how a Perimeter network keeps certain information open only to specific users or to the public while keeping the rest of the data an organization's secret. The course will also discuss how Application-level gateway functions, supports, and checks whether the type of application traffic is allowed. Finally, you will look into how the Network Intrusion Detection System(NIDS) detects and monitors network traffic and how the Network Intrusion Prevention System(NIPS) inspects, removes, and redirects malicious traffic.
With the proliferation of information technology, more and more of our personal data is being encoded and stored in the world wide web. This makes it a lot easier for hackers to gain access. While it is true that there is still no network that is totally immune to attacks, it is still essential to have trained professionals who can create stable and efficient network security system. By taking this course in Digital Network Security, you will take one big step towards becoming such a valued professional.Start Course Now
Having completed this course you will be able to:
- Describe how Firewalls protect network security.
- Describe how the role of a Perimeter network.
- List the two types of Packet filtering and their functions.
- Describe how an Application-level gateway functions.
- Explain the different types of Network security systems.
- Describe the features and functions of VPN protocol: Point-to-Point Tunneling Protocol (PPTP).
All Alison courses are free to enrol, study and complete. To successfully complete this Certificate course and become an Alison Graduate, you need to achieve 80% or higher in each course assessment. Once you have completed this Certificate course, you have the option to acquire official Certification, which is a great way to share your achievement with the world. Your Alison Certification is:
Ideal for sharing with potential employers - include it in your CV, professional social media profiles and job applications
An indication of your commitment to continuously learn, upskill and achieve high results
An incentive for you to continue empowering yourself through lifelong learning
Alison offers 3 types of Certification for completed Certificate courses:
Digital Certificate - a downloadable Certificate in PDF format, immediately available to you when you complete your purchase
Certificate - a physical version of your officially branded and security-marked Certificate, posted to you with FREE shipping
Framed Certificate - a physical version of your officially branded and security-marked Certificate in a stylish frame, posted to you with FREE shipping
All Certification is available to purchase through the Alison Shop. For more information on purchasing Alison Certification, please visit our faqs. If you decide not to purchase your Alison Certification, you can still demonstrate your achievement by sharing your Learner Record or Learner Achievement Verification, both of which are accessible from your Dashboard. For more details on our Certification pricing, please visit our Pricing Page.