Course 3 resources and citations


Week 1: Network architecture

Resources

Helpful resources to get started

 

Citations

Network components, devices, and diagrams

 

. 

Cloud computing and software-defined networks

 

Learn more about the TCP/IP model

 

The OSI model

 

Components of network layer communication

 

Week 2: Network operations

Citations

Network protocols

 

Common network protocols

 

Additional network protocols 

 

The evolution of wireless security protocols

 

Firewalls and network security measures 

 

Subnetting and CIDR

 

Proxy servers

 

Week 3: Secure against network intrusions

Resources

Analyze network attacks

 

Citations

The case for securing networks 

 

Analyze network layer communication

 

Real-life DDoS attack

 

Overview of interception attacks

 

Week 4: Security hardening

Resources

Course 3 glossary 

 

Apply OS hardening techniques

 

Citations

OS hardening practices 

 

Apply OS hardening techniques

 

Use the NIST Cybersecurity Framework to respond to a security

 

 

Firch, J. (2023, February 28). How to prevent a ICMP flood attack.

 

 

Google, Android, Chronicle, Google Drive, Google Sites, and YARA are trademarks owned by Google LLC.  All other trademarks belong to their respective owners and are not affiliated with Google LLC.


Revision #1
Created 29 June 2023 05:41:49 by naruzkurai
Updated 3 July 2023 10:29:21 by naruzkurai