• Online, Self-Paced
Course Description

To mitigate cyber, data, cloud, and information security risks, you need solid knowledge of the complete network security process, from network design to continuous monitoring and logging.

In this course, you'll explore some vital network security concepts and standard techniques for mitigating security risks.

You'll start by examining the potential vulnerabilities in a network and how these turn into threats. You'll then explore the decisions you need to make to secure the network infrastructure.

Next, you'll investigate different network zones and tools used for monitoring, detection, and logging.

You'll finish by outlining a secure network design's characteristics and the recommended guidelines and best practices for network security.

On completion of this course, you'll be able to plan for network and infrastructure-related security risks using recommended tools, methods, and best practices.

Learning Objectives

{"discover the key concepts covered in this course"}

Framework Connections