Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/sondosaabed/networks-and-network-security

By the end of this course, I developed a greater understanding of network architecture, operations, intrusion tactics, common types of network vulnerabilities and attacks, and how to secure networks. I also was introduced to common network protocols, firewalls, virtual private networks (VPNs), and system hardening practices.
https://github.com/sondosaabed/networks-and-network-security

network networksecurity

Last synced: 9 days ago
JSON representation

By the end of this course, I developed a greater understanding of network architecture, operations, intrusion tactics, common types of network vulnerabilities and attacks, and how to secure networks. I also was introduced to common network protocols, firewalls, virtual private networks (VPNs), and system hardening practices.

Awesome Lists containing this project

README

        

# Connect and Protect: Networks and Network Security
By the end of this course, I developed a greater understanding of network architecture, operations, intrusion tactics, common types of network vulnerabilities and attacks, and how to secure networks. I also was introduced to common network protocols, firewalls, virtual private networks (VPNs), and system hardening practices.
In this course, I was also able to Define types of networks, Explain how data is sent and received over a network, Recognize common network protocols, Compare and contrast local networks to cloud computing and Explain how to secure a network against intrusion tactics.
![image](https://github.com/user-attachments/assets/9b78f963-2929-4130-bdfd-bf547697cac2)

## Skill sets:
- Configuring a firewall
- Recognizing components of computer networks and cloud computing
- Analyzing threats
- Implementing security hardening

## Modules
### Module 1: Network architecture
Introduction to network security and explaining how it relates to ongoing security threats and vulnerabilities. learning about network architecture and mechanisms to secure a network.

### Module 2: Network operations
Exploring network protocols and how network communication can introduce vulnerabilities. In addition, you'll learn about common security measures, like firewalls, that help network operations remain safe and reliable.

### Module 3: Secure against network intrusions
Understanding types of network attacks and techniques used to secure compromised network systems and devices. Exploring the many ways that malicious actors exploit vulnerabilities in network infrastructure and how cybersecurity professionals identify and close potential loopholes.

### Module 4: Security hardening
Became familiar with network hardening practices that strengthen network systems. Learn how security hardening helps defend against malicious actors and intrusion methods. also learned how to use security hardening to address the unique security challenges posed by cloud infrastructures.

## Course Certificate
![image](https://github.com/user-attachments/assets/1601d3fa-a455-4f74-a036-3ffb8d3b1a5e)