In this MOOC, we will focus on learning how network systems are secured using firewalls and IDS. This will include understanding the basic components of network security, constructing a dual-firewall DMZ, and defining security policies to implement and enforce these rules. Building upon these lessons we will go in-depth on the popular Linux firewall. Finally we will learn about Network IDS and Host IDS, including a deep dive into Snort.
von
Über diesen Kurs
von

University of Colorado System
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
Lehrplan - Was Sie in diesem Kurs lernen werden
Secure Network Defense
In this module, we will learn how to construct an DMZ firewall system with dual firewalls to protect a site. We will also learn how to define critical security policies, their enforcement procedures, and apply related security design principles for the firewall system.
Implement Firewall with Linux IPTable
In this module, we will learn how to use Linux iptables to implement firewall rules for filtering packets, and SNAPT or DNAT address port translation, and the security policies.
Intrusion Detection Systems
In this module we will introduce the Snort IDS, discuss evaluation and performance of network firewalls, and finally cover Host IDS.
Bewertungen
Top-Bewertungen von SECURE NETWORKED SYSTEM WITH FIREWALL AND IDS
expected more content but still good course should have practical Approach
Über den Spezialisierung Fundamentals of Computer Network Security
This specialization in intended for IT professionals, computer programmers, managers, IT security professionals who like to move up ladder, who are seeking to develop network system security skills. Through four courses, we will cover the Design and Analyze Secure Networked Systems, Develop Secure Programs with Basic Cryptography and Crypto API, Hacking and Patching Web Applications, Perform Penetration Testing, and Secure Networked Systems with Firewall and IDS, which will prepare you to perform tasks as Cyber Security Engineer, IT Security Analyst, and Cyber Security Analyst.

Häufig gestellte Fragen
Wann erhalte ich Zugang zu den Vorträgen und Aufgaben?
Was bekomme ich, wenn ich diese Spezialisierung abonniere?
Is financial aid available?
Erhalte ich akademische Leistungspunkte für den Abschluss des Kurses?
Haben Sie weitere Fragen? Besuchen Sie das Hilfe-Center für Teiln..