Advanced Search
Search Results
987 total results found
The OSI model
So far in this section of the course, you learned about the components of a network, network devices, and how network communication occurs across a network. All communication on a network is organized using network protocols. Previously, you learned about the...
Local and wide network communication
Let's learn about how IP addresses are used to communicate over a network. IP stands for internet protocol. An internet protocol address, or IP address, is a unique string of characters that identifies a location of a device on the internet. Each device on the...
Components of network layer communication
Components of network layer communication In the reading about the OSI model, you learned about the seven layers of the OSI model that are used to conceptualize the way data is transmitted across the internet. In this reading, you will learn more about operat...
Wrap-up
Hey, you made it! Well done! Let's wrap up what you've learned in this section of the course.We explored the structure of a network, including WANs and LANs. We also discussed standard networking tools like hubs, switches, routers, and modems. We briefly intro...
Glossary terms from Course 3, Week 1
Terms and definitions from Course 3, Week 1 Bandwidth: The maximum data transmission capacity over a network, measured by bits per second Cloud computing: The practice of using remote servers, application, and network services that are hosted on the intern...
Welcome to week 2, Network potocols
Congratulations on the progress you've made so far!In this section, you'll learn about hownetworks operate using tools and protocols.These are the concepts that you'll use everyday in your work as a security analyst.The tools and protocols you'll learn in th...
Common network protocols
In this section of the course, you learned about network protocols and how they organize communication over a network. This reading will discuss network protocols in more depth and review some basic protocols that you have learned previously. You will also lea...
Additional network protocols
In previous readings and videos, you learned how network protocols organize the sending and receiving of data across a network. You also learned that protocols can be divided into three categories: communication protocols, management protocols, and security pr...
Antara: Working in network security
My name is Antara,I work on the Enterprise Infrastructure Protection Team at Google.And our main job responsibility is to protectthe infrastructure that all the amazing Google products run on.I didn't start with a background in computers, and I did my undergra...
Wireless protocols, The evolution of wireless security protocols
So far, you've learned abouta variety of network protocols,including communication protocols like TCP/IP.Now we're going to go more in depthinto a class of communication protocolscalled the IEEE802.11.IEEE802.11, commonly known as Wi-Fi,is a set of standards t...
Firewalls and network security measures
In this video, you'll learn about different types of firewalls. These include hardware, software, and cloud-based firewalls. You'll also learn the difference between a stateless and stateful firewall and cover some of the basic operations t...
Virtual private networks (VPNs)
In this video, we're going to discuss how virtual private networks, or VPNs, add security to your network. When you connect to the internet, your internet service provider receives your network's requests and forwards it to the correct destin...
Security zones
In this section, we'll discuss a type of network security feature called a security zone. Security zones are a segment of a network that protects the internal network from the internet. They are a part of a security technique called network seg...
Subnetting and CIDR
Earlier in this course, you learned about network segmentation, a security technique that divides networks into sections. A private network can be segmented to protect portions of the network from the internet, which is an unsecured global network. For examp...
Proxy servers
Previously, we discussed how firewalls, VPNs, and security zones help to secure networks. Next, we'll cover how to secure internal networks with proxy servers. Proxy servers are another system that helps secure networks. The def...
Virtual networks and privacy
This section of the course covered a lot of information about network operations. You reviewed the fundamentals of network architecture and communication and can now use this knowledge as you learn how to secure networks. Securing a private network requires ma...
Glossary terms from week 2
Glossary terms from week 2 Terms and definitions from Course 3, Week 2 Address Resolution Protocol (ARP): A network protocol used to determine the MAC address of the next router or device on the path Cloud-based firewalls: Software firewalls that are hosted...
Course 3 resources and citations
Week 1: Network architecture Resources Helpful resources to get started Coursera Code of Conduct Coursera Honor Code Coursera: Edit my profile Coursera: Learner Help Center Coursera’s Global Online Co...
The case for securing networks
Let's start by answering the question, why do we need secure networks? As you've learned, networks are constantly at risk of attack from malicious hackers. Attackers can infiltrate networks via malware, spoofing, or packet sniffing. Network operati...
Matt: A professional on dealing with attacks
My name's Matt, I'm a chaos specialist at Google. They let us choose our own job titles to best describe what it is we do. I spend a lot of my time planning for how to take care of anything that might possibly be going wrong, and when it does happen,...