EC-Council

Network Defense Essentials (NDE)

EC-Council

Instructor: EC-Council

12,393 already enrolled

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
4.6

(99 reviews)

Beginner level
No prior experience required
Flexible schedule
Approx. 31 hours
Learn at your own pace
99%
Most learners liked this course
Gain insight into a topic and learn the fundamentals.
4.6

(99 reviews)

Beginner level
No prior experience required
Flexible schedule
Approx. 31 hours
Learn at your own pace
99%
Most learners liked this course

What you'll learn

  • Fundamental concepts of network security

  • Wireless network fundamentals, types of wireless encryption, and security measures

  • Identification, authentication, and authorization

  • Cryptography techniques, cryptographic algorithms, and Public Key Infrastructure (PKI)

Skills you'll gain

Details to know

Shareable certificate

Add to your LinkedIn profile

Assessments

87 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

Placeholder

Build your subject-matter expertise

This course is part of the Cybersecurity Attack and Defense Fundamentals Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate
Placeholder
Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

There are 12 modules in this course

With the increase in the usage of emerging technology, it has become increasingly important to secure information and data being processed online. As the Internet and computer networks are continually growing, network security has become a challenging task for organizations. This module provides insight into the network security fundamentals, such as network defense approaches, network security controls, network security protocols, etc.

What's included

8 videos7 assignments

The most serious risk that organizations are facing today is unauthorized access to sensitive data. To control such data breaches, organizations require strong identification, authentication, and authorization mechanisms to effectively manage access to critical assets and sensitive data. This module provides an overview of various methods and techniques used for the identification, authentication, and authorization of users accessing critical assets and resources.

What's included

7 videos7 assignments

Compliance, policies, and governance are integral to an information security program for any organization. An organization needs to comply with certain regulatory standards to run its businesses. At the same time, it must also have strong security policies and governance in order to fulfill regulatory standards. The current module addresses this administrative aspect of an organization’s network security.

What's included

7 videos7 assignments

Physical security plays a major role in every organization. It entails the protection of critical information, network infrastructure, physical equipment and devices, facilities, personnel, etc. from environmental disasters, terrorism, vandalism, and theft. This module explains the importance of physical security, various physical security controls, importance of workplace security, and various environmental controls.

What's included

7 videos7 assignments

The most important aspect of security controls is the protection of organizational assets such as people, property, and data. By establishing security controls, an organization can either reduce or completely mitigate risks to their assets. This module provides an overview of various technical controls that help organizations in protecting their private networks and IT assets.

What's included

9 videos9 assignments

Cloud computing is an emerging technology that delivers computing services such as online business applications, online data storage, and webmail over the Internet. Cloud implementation enables a distributed workforce, reduces organization expenses, provides data security, etc. This module provides an overview of virtualization and cloud computing concepts that help organizations securely store or process data on the cloud.

What's included

8 videos8 assignments

This module deals with network security for wireless networks in enterprises. Wireless networks are widely used across organizations today and are prone to various attacks. Therefore, organizations need to focus on the planning for securing the wireless network across the organization.

What's included

7 videos7 assignments

With the introduction of mobile phones in enterprises, enterprise security has become more complex. Enterprise mobile security has become a major challenge for organizations. Therefore, it is important for organizations to address these security concerns to effectively manage the security of mobile devices. This module provides an overview of mobile device security risks and best practices for mobile platforms.

What's included

7 videos7 assignments

The use of Internet of Things (IoT) devices in enterprise IT infrastructure has created a vast security perimeter. IoT devices use both networks and the cloud. However, they are highly vulnerable to malware, ransomware, and botnet attacks. Attackers can easily compromise IoT endpoints. Understanding the security measures will help in securing IoT-enabled environments. This module provides an overview of IoT device security.

What's included

8 videos8 assignments

Cryptography and cryptographic (“crypto”) systems help in securing data against interception and compromise during online transmissions. This module provides a comprehensive understanding of different cryptosystems and algorithms, one-way hash functions, and public key infrastructures (PKIs). It also covers various tools used to encrypt sensitive data.

What's included

6 videos6 assignments

Data breaches can be costly for organizations. Therefore, it is important to keep organization data safe from prying eyes. This module explains the importance of data, and various techniques to protect data.

What's included

7 videos7 assignments

Organizations need to perform network monitoring and analyze network traffic to identify suspicious activities across their networks. This module covers the concept of network traffic monitoring.

What's included

7 videos7 assignments

Instructor

Instructor ratings
4.7 (23 ratings)
EC-Council
EC-Council
5 Courses71,039 learners

Offered by

EC-Council

Recommended if you're interested in Security

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

Learner reviews

4.6

99 reviews

  • 5 stars

    74.74%

  • 4 stars

    15.15%

  • 3 stars

    4.04%

  • 2 stars

    3.03%

  • 1 star

    3.03%

Showing 3 of 99

CS
5

Reviewed on Sep 7, 2023

JL
5

Reviewed on Nov 9, 2023

HS
5

Reviewed on Jul 5, 2024

New to Security? Start here.

Placeholder

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions