Recently Updated Pages
Subnetting and CIDR
Earlier in this course, you learned about network segmentation, a security technique that divides...
Security zones
In this section, we'll discuss a type of network security feature called a security zone....
Virtual private networks (VPNs)
In this video, we're going to discuss how virtual private networks, or VPNs, add securi...
Firewalls and network security measures
In this video, you'll learn about different types of firewalls. These include hardware,...
Wireless protocols, The evolution of wireless security protocols
So far, you've learned abouta variety of network protocols,including communication protocols like...
Antara: Working in network security
My name is Antara,I work on the Enterprise Infrastructure Protection Team at Google.And our main ...
Additional network protocols
In previous readings and videos, you learned how network protocols organize the sending and recei...
Common network protocols
In this section of the course, you learned about network protocols and how they organize communic...
Welcome to week 2, Network potocols
Congratulations on the progress you've made so far!In this section, you'll learn about hownetwo...
Glossary terms from Course 3, Week 1
Terms and definitions from Course 3, Week 1 Bandwidth: The maximum data transmission capacity ...
Wrap-up
Hey, you made it! Well done! Let's wrap up what you've learned in this section of the course.We e...
Local and wide network communication
Let's learn about how IP addresses are used to communicate over a network. IP stands for internet...
The four layers of the TCP/IP model
Now that we've discussed the structure of a network and how communications takes place, it's impo...
The TCP/IP model
Hello again. In this video, you'll learn more about communication protocols and devices used to c...
Introduction to network communication
Networks help organizations communicate and connect. But communication makes network attacks more...
Cloud networks
Companies have traditionally owned their network devices, and kept them in their own office build...
Cloud networks
Companies have traditionally owned their network devices, and kept them in their own office build...
Network components, devices, and diagrams
In this section of the course, you will learn about network architecture. Once you have a found...
Network tools
In this video, you'll learn about the common devices that make up a network. Let's get started.A ...
Emmanuel: Useful skills for network security
My name is Emmanuel and I am an offensive security engineer at Google. For offensive security, my...