Sign-up today to join over 7 million learners already on ALISON:

Fundamentals of Network Security Course


Fundamentals of Network Security
Fundamentals of Network Security

IT security training and cyber security training are important to understand security risks on your computer. Learn how to protect a computer network successfully.


Join 37,644 other students.

Course Description

Computer networks are central to modern digital communication technologies; however, network security is constantly under attack from both external and internal sources.


This free online course examines the fundamentals of network security and covers topics such as active and passive attacks on networks, encryption, symmetric and asymmetric key systems, authentication using certification authorities, and access control using passwords and firewalls.


This course will be of interest to IT professionals who want to learn more about network security or students who are interested in a career as an IT or network administrator.

CERTIFICATION

To qualify for your official ALISON Diploma, Certificate or PDF you must study and complete all modules and score 80% or more in each of the course assessments. A link to purchase your Diploma certificate will then appear under the My Certificates heading of your My Account page.

LEARNING OUTCOMES

Upon completion of this course you will understand and be more aware of the potential threats that are continuously experienced in computer networks today. You will know the measures that need to be taken to avoid these problems in your own computer network. You will know the businesses that are more at risk of security concerns and the actions taken to reduce these concerns in a business. You will understand factors of security, such as encryption, that are used to protect computer networks.

Share This Course!






Manage a Group of Learners
Course Rating (By Learners): 4 stars based on 611 votes
Course Title: Fundamentals of Network Security
Course #: 357
Course Publisher: OpenLearn
Course Category: 1
Content Origin:
Course Description:

Computer networks are central to modern digital communication technologies; however, network security is constantly under attack from both external and internal sources.


This free online course examines the fundamentals of network security and covers topics such as active and passive attacks on networks, encryption, symmetric and asymmetric key systems, authentication using certification authorities, and access control using passwords and firewalls.


This course will be of interest to IT professionals who want to learn more about network security or students who are interested in a career as an IT or network administrator.

License: This course is available from OpenLearn through the following Creative Commons licence:
Creative Commons License
Release Date: 19 April 2013
Content  
Course Duration (Avg Learner): 1-2 Hours
Video/Audio: None
Audio Only: None
Animation: None
Assessments: Yes
Education Level
Age appropriateness: 16+ Years
Minimum Grade/Class Level:
Validation: Level 5
ALISON Testing: Yes
Certification Availability
PDF Download: Yes
Parchment: Yes
Framed Certification: Yes

Study for Free at Your Own Pace! Start This Course

  • Ayele Miga
    Ayele Miga Ethiopia It's good. it helps me introduction part as an IT professional 2016-04-26 13:04:26
  • Stewart Ortiz
    Stewart Ortiz United States of America Great way to learning the fundamentals in network security and something you need in your everyday life. 2016-04-26 02:04:11
  • Adeshina Ogunleye
    Adeshina Ogunleye United Kingdom Very good, touches on all aspect of the reading materials. 2016-04-25 12:04:21
  • Devon Harewood
    Devon Harewood Trinidad and Tobago The content of this course is in fact one i would recommend to anyone interested, i've had Network experience before and would agree with the diagrams and content given within this course. 2016-04-21 20:04:54
  • Wendell Prout
    Wendell Prout United States of America Very interesting and in-depth. It however requires much more time than estimated by Alison. 2016-04-18 02:04:24
  • William Wood
    William Wood United States of America This is a quick and easy primer. 2016-04-17 15:04:09
  • Khalid AL-Dubai
    Khalid AL-Dubai Yemen It was amazing and i got a good information about network security 2016-04-13 19:04:19
  • Michealair Louisdor
    Michealair Louisdor United States of America The key tools and technologies used to secure network access Examine common security vulnerabilities and the defenses used to protect network resources Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates Learn how to design, adopt, and enforce security policies Evaluate the nuances of secure network design Secure HTTP traffic by hardening operating systems, servers, and browsers Protect routers through administrative access policies and services Understand what firewalls do and how to implement them to maximum effect Inspect and monitor network activity with IDS Utilize VPNs for secure remote access Learn about PKI technologies Examine secure wireless design techniques Use logging and auditing tools, such as syslog, SNMP, RMON, and SAA, to manage network traffic. This hands-on, project-based approach to the fundamentals of network security concepts and skills helps students understand security best practices, laws, and standards that will enable them to build a complete security program. Divided into four parts, Network Security Fundamentals takes you on a tour of all the essential technologies and modern defenses at your disposal to help you maintain network uptime and data integrity. Part I covers the basics, introducing terms and concepts and laying the foundation of a solid security structure. The discussion focuses on weaknesses and vulnerabilities along with an overview of the traditional defenses used to thwart attacks. Part II examines two components of security-cryptography and security policies. Part III looks at the various security components. Separate chapters cover web security, router security, firewalls, intrusion detection systems (IDS), remote access security, virtual private networks (VPN), Public Key Infrastructure (PKI), wireless security, and logging and auditing. Each chapter in this section is a self-contained tutorial, allowing you to skip to those topics of greatest interest or primary concern. Part IV includes several reference appendixes, including the Cisco SAFE Blueprint, NSA guidelines, and SANS policies. Conclusions With the increased number of threats to networks such as worms, viruses and clever hackers, security can no longer be viewed as an option, even within “private” networks. Securing all equipment, including physical infrastructure equipment such as UPS systems and HVAC systems, is critical to maintaining uptime and seamless access to services. Providing and maintaining security across the enterprise typically means increased administration. Historically, this has been the largest barrier to broad implementations of security. Today, the amount of time spent repairing a network due to just a single worm or virus attack can easily be greater than the upfront time to more adequately secure an enterprise. Fortunately, there are many options in systems and software to increase the security of the network while reducing the overhead of managing such systems. Even basic practices such as periodic software updates, locking down all devices and using centralized authentication and secure access methods can go a long way to reducing risks. Institution of appropriate security policies and frequent network audits further increase the overall protection of the network. 2016-04-13 01:04:04
  • BluStr3k Colby
    BluStr3k Colby Canada It was very educational and it will help me in the future! 2016-04-10 01:04:33
  • Joseph Assan
    Joseph Assan United Kingdom A good course if you are aiming at pursue a professional course in Networks 2016-04-04 18:04:09
More Comments and Reviews >>

Study for Free at Your Own Pace! Start This Course

Free, Online Fundamentals of Network Security Course.