Advanced Search
Search Results
951 total results found
Wireless protocols, The evolution of wireless security protocols
So far, you've learned abouta variety of network protocols,including communication protocols like TCP/IP.Now we're going to go more in depthinto a class of communication protocolscalled the IEEE802.11.IEEE802.11, commonly known as Wi-Fi,is a set of standards t...
Firewalls and network security measures
In this video, you'll learn about different types of firewalls. These include hardware, software, and cloud-based firewalls. You'll also learn the difference between a stateless and stateful firewall and cover some of the basic operations t...
Virtual private networks (VPNs)
In this video, we're going to discuss how virtual private networks, or VPNs, add security to your network. When you connect to the internet, your internet service provider receives your network's requests and forwards it to the correct destin...
Security zones
In this section, we'll discuss a type of network security feature called a security zone. Security zones are a segment of a network that protects the internal network from the internet. They are a part of a security technique called network seg...
Subnetting and CIDR
Earlier in this course, you learned about network segmentation, a security technique that divides networks into sections. A private network can be segmented to protect portions of the network from the internet, which is an unsecured global network. For examp...
Proxy servers
Previously, we discussed how firewalls, VPNs, and security zones help to secure networks. Next, we'll cover how to secure internal networks with proxy servers. Proxy servers are another system that helps secure networks. The def...
Virtual networks and privacy
This section of the course covered a lot of information about network operations. You reviewed the fundamentals of network architecture and communication and can now use this knowledge as you learn how to secure networks. Securing a private network requires ma...
Glossary terms from week 2
Glossary terms from week 2 Terms and definitions from Course 3, Week 2 Address Resolution Protocol (ARP): A network protocol used to determine the MAC address of the next router or device on the path Cloud-based firewalls: Software firewalls that are hosted...
Course 3 resources and citations
Week 1: Network architecture Resources Helpful resources to get started Coursera Code of Conduct Coursera Honor Code Coursera: Edit my profile Coursera: Learner Help Center Coursera’s Global Online Co...
The case for securing networks
Let's start by answering the question, why do we need secure networks? As you've learned, networks are constantly at risk of attack from malicious hackers. Attackers can infiltrate networks via malware, spoofing, or packet sniffing. Network operati...
Matt: A professional on dealing with attacks
My name's Matt, I'm a chaos specialist at Google. They let us choose our own job titles to best describe what it is we do. I spend a lot of my time planning for how to take care of anything that might possibly be going wrong, and when it does happen,...
Denial of Service (DoS) attacks
Welcome back. In this video, we're going to discuss denial of service attacks. A denial of service attack is an attack that targets a network or server and floods it with network traffic. The objective of a denial of service attack, or a DoS ...
Read tcpdump logs
A network protocol analyzer, sometimes called a packet sniffer or a packet analyzer, is a tool designed to capture and analyze data traffic within a network. They are commonly used as investigative tools to monitor networks and identify suspicious activity. Th...
Real-life DDoS attack
Previously, you were introduced to Denial of Service (DoS) attacks. You also learned that volumetric distributed DoS (DDoS) attacks overwhelm a network by sending unwanted data packets in such large quantities that the servers become unable to service normal u...
Malicious packet sniffing
In this video, we'll discuss packet sniffing, with a focus on how threat actors may use this technique to gain unauthorized access to information. Previously, you learned about the information and data packets that travel across the network. ...
IP Spoofing
Next, let's learn about another kind of network attack called IP spoofing. IP spoofing is a network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network. In ...
Overview of interception tactics
In the previous course items, you learned how packet sniffing and IP spoofing are used in network attacks. Because these attacks intercept data packets as they travel across the network, they are called interception attacks. This reading will introduce you to...
temp
things to review On-path attack Distributed denial of service attack (DDoS) Denial of service attack (DoS) SYN flood attack IP spoofing Packet sniffing
Glossary terms from week 3 & wrap-up
Nice job finishing this section! Let's review what you've learned so far. We discussed how to secure networks. We also learned about network intrusion tactics like malicious packet sniffing and IP spoofing. Finally, we discussed how a securit...
Introduction to security hardening
I want to take a moment to congratulate you on your progress so far. First, you learned about network operations. Then, you learned about the tools and protocols that help network systems function. Next, you learned how vulnerabilities in netwo...