This course focuses on designing and analyzing secured network system. It focuses on dealing with vulnerabilities, threats, motive, opportunity and methods used by hackers as well as confidentiality and integrity.
You will be able to identify the main causes of cyber-attacks, the threats they possess and how to defend them once you have completed this course. It discusses five methods of defense which are Prevention, Deterioration, Deflection, Detection and Recovery.
Assessment
This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.
Certification
Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.
Having an Official Edukite Certification is a great way to celebrate and share your success. You can:
- Add the certificate to your CV or resume and brighten up your career
- Show it to prove your success
Course Credit: University of Colorado
Course Curriculum
Module 01 | |||
Network Security – Design and Analyze Secure Networked Systems – Overview | 00:03:00 | ||
Network Security – Vulnerabilities and Threats | 00:12:00 | ||
Network Security – Method, Opportunity, and Motive | 00:05:00 | ||
Network Security – Confidentiality, Integrity, and Availability | 00:14:00 | ||
Network Security – Risk, Risk Assessment and Method of Defense | 00:07:00 | ||
Network Security – Security Principles, Defense with Diversity, Cyber Resilience | 00:07:00 | ||
Network Security – Apply Principle of Least Privileges for Access Control | 00:10:00 | ||
Network Security – Principle of Adequate Data Protection | 00:05:00 | ||
Module 02 | |||
Network Security – In Software We Trust Really | 00:10:00 | ||
Network Security – Sign Software with GPG | 00:12:00 | ||
Network Security – Verify Software Integrity and Authenticity | 00:09:00 | ||
Network Security – Web of Trust | 00:10:00 | ||
Network Security – Public Key Infrastructure | 00:11:00 | ||
Network Security – What are in a Certificate | 00:09:00 | ||
Network Security – Being Your Own CA | 00:22:00 | ||
Network Security – Server Certificate and Installation | 00:14:00 | ||
Network Security – Setup Client Certificate | 00:07:00 | ||
Network Security – Client Server Mutual Authentication | 00:08:00 | ||
Module 03 | |||
Network Security – Basic Cryptography and Programming with Crypto API: Course Overview | 00:03:00 | ||
Network Security – Basic Cryptography | 00:10:00 | ||
Network Security – Kerckhoff’s Principle | 00:09:00 | ||
Network Security – CryptoAnalysis of Monoalphabetic Substitution Cipher | 00:13:00 | ||
Network Security – Columnar Transposition Ciphers | 00:04:00 | ||
Network Security – One Time Pad & Quantum Key Distribution | 00:10:00 | ||
Network Security – Symmetric Key Algorithm | 00:09:00 | ||
Network Security – Advanced Encryption Standard | 00:09:00 | ||
Module 04 | |||
Network Security – AES Expansion Schedule | 00:05:00 | ||
Network Security – AES Selection Criteria | 00:13:00 | ||
Network Security – Dealing with Block Swapping and Replay Attacks | 00:08:00 | ||
Network Security – Block Cipher Mode of Operation | 00:11:00 | ||
Network Security – Diffie Hellman Symmetric Key Exchange Protocol | 00:07:00 | ||
Network Security – Modular Arithmetic | 00:14:00 | ||
Network Security – Euler Totient Theorem | 00:14:00 | ||
Network Security – RSA Asymmetric Crypto Algorithm | 00:18:00 | ||
Network Security – Understanding RSA with Open SSL | 00:06:00 | ||
Network Security – Use Crypto API to Encrypt and Decrypt | 00:15:00 | ||
Network Security – Use Crypto API to Sign and Verify | 00:10:00 | ||
Network Security – Mini Capstone Enhance Registration Web Site Security | 00:20:00 | ||
Module 05 | |||
Network Security – Course 3 – Hacking and Patching Overview | 00:03:00 | ||
Network Security – Command Injection | 00:12:00 | ||
Network Security – Review Code to Detect Pattern to Defend Command Injection | 00:12:00 | ||
Network Security – Apply Security Design Pattern to Defend Command Injection Attack | 00:07:00 | ||
Network Security – SQL Injection Attacks | 00:11:00 | ||
Network Security – Patching Web App with SQL Injection Vulnerability | 00:05:00 | ||
Network Security – Hacking Methodology | 00:10:00 | ||
Network Security – Demystify New OSPL Will Not Havev Injection Vulnerabilities | 00:08:00 | ||
Network Security – Demystify New OSPL Will Not Havev Injection Vulnerabilities | 00:08:00 | ||
Module 06 | |||
Network Security – Escalate Privileges via Deploying Trojan | 00:11:00 | ||
Network Security – Escalate Privileges by Bringing in Sophisticated Trojan | 00:09:00 | ||
Network Security – Security in Memory Systems and Virtual Memory Layout | 00:15:00 | ||
Network Security – Variables Allocation in Virtual Memory Layout | 00:06:00 | ||
Network Security – Buffer Overflow | 00:14:00 | ||
Network Security – Buffer Overflow Defense | 00:16:00 | ||
Network Security – Vulnerability Scanning with Nessus | 00:07:00 | ||
Network Security – Vulnerability and WannaCry Ransomware | 00:08:00 | ||
Module 07 | |||
Network Security – Penetration Testing with Kali Linux | 00:07:00 | ||
Network Security – Metasploit Framework | 00:11:00 | ||
Network Security – Keylogging | 00:03:00 | ||
Network Security – Remote VNC Server Injection | 00:02:00 | ||
Network Security – Secure Networked System with Firewall and IDS Course Overview | 00:02:00 | ||
Network Security – Network Defense | 00:08:00 | ||
Network Security – DMZ Firewall | 00:08:00 | ||
Module 08 | |||
Network Security – iptables and Inbound Traffic | 00:14:00 | ||
Network Security – iptables and Outbound Traffic | 00:07:00 | ||
Network Security – Stateful Firewall | 00:02:00 | ||
Network Security – Snort IDS | 00:12:00 | ||
Network Security – Evaluate Firewall Performance | 00:03:00 | ||
Network Security – Host IDS | 00:04:00 | ||
Assessment | |||
Submit Your Assignment | 00:00:00 | ||
Certification | 00:00:00 |
Course Reviews
No Reviews found for this course.