Google Network Security
Google via Coursera Specialization
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
In today's interconnected world, network security is more critical than ever. This Specialization from Google provides you with foundational knowledge of how networks function and how to protect them from attacks.
You’ll dive into core concepts like network architecture, protocols, and how to defend against modern cyber threats. You’ll also learn how to utilize powerful tools such as Wireshark, tcpdump, Splunk, and Google SecOps.
Google experts will guide you through this Specialization by providing hands-on activities that simulate relevant tasks, teaching you how to:
Configure network addresses and understand how data travels through the network Read and interpret network traffic flows to identify suspicious activity Configure network services and understand the difference between a VPN and a proxy Troubleshoot connectivity issues and fix them quickly Harden systems and conduct a basic incident response process
Upon completion, you’ll be able to analyze network traffic, recognize common vulnerabilities, and implement strategies to secure both traditional networks and cloud environments.
Syllabus
- Course 1: Network Architecture
- Course 2: Network Operations
- Course 3: Secure Against Network Intrusions
- Course 4: Security Hardening
- Course 5: Introduction to Detection and Incident Response
- Course 6: Network Monitoring and Analysis
- Course 7: Network Traffic and Logs Using IDS and SIEM Tools
Courses
-
In this course, you'll focus on incident detection and response. You will learn what defines a security incident and explain the incident response lifecycle, including the roles and responsibilities of incident response teams. You will also explore how security professionals verify and respond to malicious threats. By the end of this course, you will be able to: - Explain the lifecycle of an incident - Describe the tools used in the documentation, detection, and management of incidents. - Determine the roles and responsibilities of incident response teams - Identify the steps to contain, eradicate, and recover from an incident
-
This course provides a brief introduction to network architecture, discussing network components, devices, and tools. It also introduces you to the TCP/IP and OSI models of network communication and discusses the components of network layer communication. The course introduces network security, mechanisms to secure the network, and explains how it relates to ongoing security threats and vulnerabilities. By the end of this course, you will be able to: - Describe the structure of different computer networks - Illustrate how data is sent and received over a network - Describe physical components of a network and network layer communication - Identify common network security measures and protocols - Understand how the TCP/IP model provides a framework for network communication
-
In this course, you will be provided with an overview of network analysis tools more commonly referred to as “packet sniffers”. In particular, you will sniff the network and analyze packets for malicious threats. You’ll also craft common filtering commands in both tcpdump and Wireshark to analyze the contents of packet capture. By the end of this course, you will be able to: - Describe how network traffic analysis can help to detect, prevent, and respond to security incidents - Use packet sniffing tools to capture and view network communications - Analyze packets to interpret network communications
-
This course explores the network tools, protocols, and techniques that govern the functioning of network systems. Communication takes place on a network, and that communication can introduce vulnerabilities to the network. You will understand protocols that regulate network communication and be introduced to the tools and concepts that play a major role in ensuring network operations are safe and reliable. By the end of this course, you will be able to: - Recognize common network protocols - Identify common network security measures and protocols - Describe the protocol(s) used to transmit and access data over wireless networks
-
In this course, you will be provided with a conceptual overview of logs and their role in Intrusion Detection Systems (IDSs) and Security Information and Event Management tools (SIEMs). The course will discuss the general concept of an IDS and how it works to detect attacks before highlighting specific IDS and SIEM products, such as Suricata, Splunk and Google SecOps (Chronicle), respectively. You will then develop an understanding of how to access and navigate within Suricata and how basic rules are set up to provide alerts, events, and logs for malicious network traffic. This course will conclude with an introduction to Splunk and Google SecOps (Chronicle) and will showcase some of their features, including common commands. By the end of this course, you will be able to: - Discuss the importance of logs during incident investigation - Determine how to read and analyze logs during incident investigation - Describe how common intrusion detection system (IDS) tools provide security value - Interpret the basic syntax and components of signatures and logs in IDS and NIDS tools - Describe how SIEM tools collect, normalize, and analyze log data - Perform queries in SIEM tools to investigate an incident
-
In this course, you’ll explore different types of network attacks and various tactics used to secure compromised network systems and devices. Malicious actors employ a variety of methods to exploit vulnerabilities in network infrastructure, and this requires security professionals to always stay aware of potential loopholes. Being aware of all the ways that networks are targeted is an important skill for a cybersecurity analyst. By the end of this course, you will be able to: - Describe network intrusion tactics - Understand different types of network attacks - Investigate security breaches - Explain how to secure a network against intrusion tactics - Troubleshoot basic network issues using appropriate tools and methods
-
This course helps you familiarize themselves with network hardening practices that strengthen network systems over time. Security professionals work against experiencing numerous security breaches, which is why it is important to take preliminary security measures to remain one step ahead of attackers. Malicious actors are constantly evolving in their intrusion methods and network security hardening is a defensive strategy that aims to prevent or lessen the chances of future attacks taking place. Security hardening also involves securing applications over cloud systems and addressing the unique security challenges posed by cloud infrastructures. By the end of this course, you will be able to: - Describe network and cloud hardening techniques that target network vulnerabilities - Describe OS hardening techniques - Describe network hardening techniques - Explain cloud security practices
Taught by
Google Career Certificates