Skip main navigation

Hurry, only 10 days left to get one year of Unlimited learning for £249.99 £174.99. New subscribers only. T&Cs apply

Find out more

The Final Week Ahead

Understand what is in store for the week.
Woman looking at code on a monitor

In the coming week, we will cover the following topics:

  • Red Teams and Blue Teams
  • how to track a hacker
  • how to prepare for, and recover from, an attack

By the end of this week, you will be able to:

  • describe the role of Red/Blue Teams in network security
  • understand the use of OSINT in network security
  • understand how to use IP tracking
  • understand the use of canary tokens
  • understand the use of Bitcoin tracking
  • understand how to set up a Damage Control Plan for your network
  • understand how to set up a Data Backup and Recovery Plan
This article is from the free online

Advanced Cyber Security Training: Network Security

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now