CISCO Networking Academy

Network Defense

Learn how to monitor and protect your network and evaluate security alerts.

Achievements

Badges you can earn in this course.
 

Overview

Develop the essential skills needed for a Junior Cybersecurity Analyst role and gain practical knowledge for the workplace. This course explores methods for monitoring networks and analyzing security alerts. Learn to use tools and techniques to safeguard networks, including access control, firewalls, cloud security, and cryptography. By mastering these and other defense mechanisms, you’ll understand how to build a robust, layered defense-in-depth strategy. The expertise gained will equip you to defend networks against various cyberattacks and respond swiftly to potential exploits.

Course Curriculum

Module 1: Understanding Defense
  • Introduction
  • Defense-in-Depth
  • Cybersecurity Operations Management
  • Security Policies, Regulations, and Standards
  • Understanding Defense Summary
  • Introduction
  • Physical Security
  • Application Security
  • Network Hardening: Services and Protocols
  • Network Hardening: Segmentation
  • Hardening Wireless and Mobile Devices
  • Cybersecurity Resilience
  • Embedded and Specialized Systems
  • System and Network Defense Summary
  • Introduction
  • Access Controls
  • Access Control Concepts
  • Account Management
  • AAA usage and operation
  • Access Control Summary
  • Introduction
  • Introduction to Access Control Lists
  • Wildcard Masking
  • Configure ACLs
  • Named Standard IPv4 ACL Syntax
  • Implement ACLs
  • Mitigate Attacks with ACLs
  • IPv6 ACLs
  • Access Control Lists Summary
  • Introduction
  • Secure Networks with Firewalls
  • Firewalls in Network Design
  • Firewall Technologies Summary
  • Introduction
  • ZPF Overview
  • ZPF Operation
  • Configure a ZPF
  • Zone-Based Firewalls Summary
  • Introduction 
  •  Cloud Security Summary
  •  Protecting VMs
  •  Cloud Data Security
  • Cloud Application Security
  • Cloud Infrastructure Security
  • The Domains of Cloud Security
  • Virtualization and Cloud Computing
  • Introduction
  • Confidentiality
  • Obscuring Data
  •  Integrity and Authenticity
  • Using Hashes
  • Public Key Cryptography
  • Authorities and the PKI Trust System
  • Applications and Impacts of Cryptography
  • Cryptography Summary
  • Introduction
  • Monitoring Common Protocols
  • Security Technologies
  • Technologies and Protocols Summary
  • Types of Security Data
  • End Device Logs
  • Network Logs
  • Network Security Data Summary
  • Introduction
  • Sources of Alerts
  • Overview of Alert Evaluation
  • Evaluating Alerts Summary