Recently Updated Pages
Glossary terms from week 3 & wrap-up
Nice job finishing this section! Let's review what you've learned so far. We discussed ...
temp
things to review On-path attack Distributed denial of service attack (DDoS) Denial of servic...
Overview of interception tactics
In the previous course items, you learned how packet sniffing and IP spoofing are used in network...
IP Spoofing
Next, let's learn about another kind of network attack called IP spoofing. IP spoofing ...
Malicious packet sniffing
In this video, we'll discuss packet sniffing, with a focus on how threat actors may use...
Real-life DDoS attack
Previously, you were introduced to Denial of Service (DoS) attacks. You also learned that volumet...
Read tcpdump logs
A network protocol analyzer, sometimes called a packet sniffer or a packet analyzer, is a tool de...
Denial of Service (DoS) attacks
Welcome back. In this video, we're going to discuss denial of service attacks. A denial...
Matt: A professional on dealing with attacks
My name's Matt, I'm a chaos specialist at Google. They let us choose our own job titles to be...
The case for securing networks
Let's start by answering the question, why do we need secure networks? As you've learned,...
Course 3 resources and citations
Week 1: Network architecture Resources Helpful resources to get started Coursera Code...
Glossary terms from week 2
Glossary terms from week 2 Terms and definitions from Course 3, Week 2 Address Resolution Proto...
Virtual networks and privacy
This section of the course covered a lot of information about network operations. You reviewed th...
Proxy servers
Previously, we discussed how firewalls, VPNs, and security zones help to secure networks....
Subnetting and CIDR
Earlier in this course, you learned about network segmentation, a security technique that divides...
Security zones
In this section, we'll discuss a type of network security feature called a security zone....
Virtual private networks (VPNs)
In this video, we're going to discuss how virtual private networks, or VPNs, add securi...
Firewalls and network security measures
In this video, you'll learn about different types of firewalls. These include hardware,...
Wireless protocols, The evolution of wireless security protocols
So far, you've learned abouta variety of network protocols,including communication protocols like...
Antara: Working in network security
My name is Antara,I work on the Enterprise Infrastructure Protection Team at Google.And our main ...