This course is part of Cybersecurity.
This comprehensive course explores the critical aspects of network security, focusing on both wired and wireless data network protection. Students learn advanced techniques in intrusion detection, evidence collection, and network defense through hands-on laboratories and experiments. The curriculum covers various security mechanisms including physical layer security, filters, applications, and encryption. Through practical scenarios, students analyze attack/defend situations and evaluate defense deployment effectiveness.
4.8
(11 ratings)
49,695 already enrolled
Instructors:
English
English
What you'll learn
Master network intrusion detection and evidence collection techniques
Learn to identify and respond to ongoing network attacks
Develop skills in network vulnerability testing and assessment
Gain expertise in implementing effective network defense strategies
Understand various network attack methods and appropriate countermeasures
Skills you'll gain
This course includes:
Live video
Graded assignments, Exams
Access on Mobile, Tablet, Desktop
Limited Access access
Shareable certificate
Closed caption
Get a Completion Certificate
Share your certificate with prospective employers and your professional network on LinkedIn.
Created by
Provided by

Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.





There are 8 modules in this course
This advanced course in network security provides comprehensive coverage of data network protection strategies. Students learn through a combination of theoretical concepts and hands-on laboratories, exploring mechanisms for securing both wired and wireless networks. The curriculum includes practical experience with packet sniffing, vulnerability testing, access control implementation, and defense against various types of network attacks. Special emphasis is placed on understanding both attacker and defender perspectives to develop effective security strategies.
Packet Sniffing
Module 1
Password Cracking
Module 2
Port Scanning
Module 3
Exploits and Exploiting
Module 4
Snort
Module 6
DHCP DNS and Switch Attacks
Module 7
Man in The Middle Attacks
Module 8
Fee Structure
Individual course purchase is not available - to enroll in this course with a certificate, you need to purchase the complete Professional Certificate Course. For enrollment and detailed fee structure, visit the following: Cybersecurity
Payment options
Financial Aid
Instructor

2 Courses
Distinguished Cybersecurity Educator and Industry Expert
Jonathan S Weissman serves as Principal Lecturer in the Department of Cybersecurity at Rochester Institute of Technology bringing over two decades of expertise in cybersecurity and computing education His academic credentials include a master's degree in Computer Science from Brooklyn College complemented by an impressive portfolio of 47 industry certifications His teaching excellence has been recognized through multiple awards including the 2014 RIT Outstanding Teaching Award 2018 GCCIS Outstanding Educator Award and 2019 RIT Distinguished Teacher Recognition Program Honors Since beginning his teaching career in 2001 he has taught more than 50 graduate and undergraduate courses reaching over 300000 learners worldwide through the edX RITx Cybersecurity MicroMasters program His expertise spans networking cybersecurity systems administration ethical hacking digital forensics and malware reverse engineering He has authored several influential books including Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual and multiple editions of CompTIA Network+ guides His industry impact extends beyond academia through his work as a cybersecurity consultant regular appearances as an expert on TV news and talk radio and his induction into the IPv6 Forum's New Internet IPv6 Hall of Fame in 2021 His commitment to cybersecurity education is further demonstrated through his development of comprehensive curriculum materials conference presentations and workshops making him a leading voice in cybersecurity education and practice
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.