Weekly study10 hours
Explore the principles behind perimeter security
In this course you will explore the different network topologies. You will learn to deploy security solutions and become familiar with concepts of perimeter security based on firewalls.
- Network protocols security issues
- Port security
Learning on this course
You can take this self-guided course and learn at your own pace. On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.
What will you achieve?
By the end of the course, you‘ll be able to...
- Describe the security implication of different network topologies
- Evaluate and deploy network internal and perimeter security solutions
- Describe the concepts of perimeter security based on firewalls
- Demonstrate the rule manipulations in firewalls and IDS
Who is the course for?
This course is designed for people familiar with basic computing who want to learn about the techniques and technologies of network security.
Please note that the individuals detailed in the “Who will you learn with?” section below, are current staff members and may be subject to change.
What software or tools do you need?
In order to complete the labs you will need a PC capable of running Virtual Machines (VMs). We recommend at least a dual core CPU and 8GB of memory. You would also need about 100GB of hard disk space to store the VMs.
In order to run the virtual machines you will need to download and install VMware Workstation Player (if you are running on Windows or Linux). It is free for non-commercial/educational use and you can get it from the VMware website. If you are running a Mac you will need VMware Fusion.
You will also use Linux. If you are not already familiar with the Linux environment and its command line, there are plenty of online resources and tutorials to get you started. We would recommend that you look into some of these before starting the modules. You need to be familiar with the core linux commands, input/output redirecting and piping, file manipulation, basic network configuration and user account management.