Network Security

Network Security is a set of measures designed to protect the integrity, confidentiality, and accessibility of computer networks. Coursera's Network Security catalogue teaches you the fundamentals of designing, implementing, and managing secure networks. You'll learn about the different types of intrusions, attacks, and threats to network security, and how to defend against them using firewalls, intrusion detection systems, and encryption technologies. Additionally, you will gain an understanding of secure network architectures, VPNs, wireless network security, and the importance of network security policies. This skill is crucial for roles such as network administrators, security analysts, and cybersecurity professionals.
131credentials
2online degrees
427courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Explore the Network Security Course Catalog

  • Status: Preview

    Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Computer Security Incident Management, Incident Response, Security Controls, Network Security, Encryption

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Threat Detection, Application Security, Technical Communication, Infrastructure Security, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Local Area Network (VLAN), Payment Card Industry (PCI) Data Security Standards, Scripting, Technical Writing, NIST 800-53, Automation, Technical Consulting

  • Status: Free

    Skills you'll gain: Network Protocols, Network Performance Management, Network Monitoring, Network Troubleshooting, Threat Detection, Network Analysis, TCP/IP, Web Servers, Network Security

  • Status: Free Trial

    Skills you'll gain: File Systems, Microsoft Windows, Cybersecurity, TCP/IP, Network Protocols, Data Security, Litigation Support, File Management, Network Security, Operating Systems, Data Structures, General Networking, Data Validation, Record Keeping, System Software, Data Integrity, Data Analysis Software, User Accounts, USB, System Configuration

  • Status: Free Trial

    Skills you'll gain: Cybersecurity, Network Security, Internet Of Things, Infrastructure Security, Communication Systems, Wireless Networks, Network Protocols, Network Architecture, General Networking, Network Infrastructure, Data Security, Encryption, Distributed Computing

  • Status: Free Trial

    Skills you'll gain: Firewall, Network Security, Virtual Private Networks (VPN), Network Administration, Intrusion Detection and Prevention, Network Infrastructure, Enterprise Security, Network Architecture, Security Controls, System Configuration, Performance Tuning, Cybersecurity, Malware Protection, Threat Detection

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Responsible AI, Network Routing, Infrastructure Security, Application Security, Information Systems Security

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Security Controls, Vulnerability Assessments, Identity and Access Management, Asset Management

  • Status: New
    Status: Free Trial

    Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Encryption, Cloud Security, Web Applications, Internet Of Things, Cloud Computing, Network Architecture

  • Skills you'll gain: Cybersecurity, Threat Management, Security Controls, Cyber Security Strategy, Threat Detection, Cyber Security Policies, Security Awareness, Computer Security Awareness Training, Cyber Risk, Data Security, Network Security, Enterprise Security, Information Assurance, Incident Response, Data Integrity

  • Status: Free Trial

    Skills you'll gain: Threat Management, Threat Modeling, Vulnerability Assessments, Incident Response, Computer Security Incident Management, Public Key Infrastructure, IT Security Architecture, Disaster Recovery, Vulnerability Management, Regulation and Legal Compliance, Threat Detection, Cyber Security Assessment, Risk Management, Compliance Management, Regulatory Compliance, Network Security, Infrastructure Security, Cloud Security, Hardening, Software-Defined Networking

  • Status: Free Trial

    Skills you'll gain: Cybersecurity, TCP/IP, Network Protocols, Data Security, Litigation Support, Network Security, General Networking, Record Keeping, Data Storage, Data Integrity, Cryptography, File Management, File Systems, Encryption, Data Validation, Command-Line Interface, Technical Writing, Linux Commands, Unix Commands, Algorithms