Learn how to identify, mitigate, prevent, and recover from network attacks and understand how to increase your network security.
![](https://ugc.futurelearn.com/uploads/images/9a/a3/header_9aa39a81-66eb-43c5-8c4d-47372a0af32a.jpg)
Duration
4 weeksWeekly study
3 hours
Advanced Cyber Security Training: Network Security
Understand the importance of network security
Cyber attacks on your business or home network can have devastating results. This four-week course will give you the knowledge and skills to identify and prevent these attacks, as well as helping you increase your network security.
Using a practical approach to cyber security, you’ll learn how to deal with the growing problem of network attacks and understand how malicious hackers could break into your network.
Learn how to identify types of network attacks
On this course, you’ll build your understanding of network security and how to deal with disaster recovery, should a network attack happen.
You’ll start with an introductionto the different types of attackers and network attacks that occur, including phishing, spear phishing, DDOS, and ransomware.
You’ll also learn vital techniques to help you recover from an attack.
Conduct threat assessment scanning and learn how to use security tools
Having understood the theory of network attacks, you’ll use a hands-on approach to strengthen your knowledge.
You’ll discover and use the tools needed to conduct threat assessment scanning including Nmap, Spiderfoot, OpenVas and Nessus.
You’ll also understand how to carry out a penetration test using ExploitDB.
Learn how to use OSINT and how to secure your network
Using OSINT tools (open-source intelligence), you’ll learn how to gather intelligence on the attacker, allowing you to narrow down potential vulnerabilities and understand how hackers recon your network.
These transferable cyber security skills can then be used to increase the security in your network, making it a harder target for potential attackers.
Syllabus
Week 1
Is My Network Really Under Attack?
Welcome to Network Security
In these steps, you will be introduced to your educator and learn what to expect in the coming week.
Introduction to Network Threats
In this activity, you will learn about your risk level and typical types of network attacks.
How a Malicious Hacker Goes About Breaking into Your Network: Physical Attacks and Man in the Middle Attacks
How a Malicious Hacker Goes About Breaking into Your Network: Physical Attacks and Man in the Middle Attacks
How a Malicious Hacker Goes About Breaking into Your Network: Social Engineering
In this section you will learn about how hackers use social engineering to access your network, and what you can do to identify and prevent these attacks.
Week 1 Summary
You have reached the end of Week 1! Let’s reflect on what you have covered so far.
Week 2
How to Securing Your Network from Within
Welcome to Week 2!
Find out what is in store for this week.
Securing Your Network Through Your Users
In this section you will learn about the importance of educating your network users to keep your network secure.
Securing Your Machine: Common Ways in for Hackers
In this section you will learn about several threat types and important practices to protect your machine and your network from threats.
Securing Your Machine: Changes You Should Make
In this section, you will learn about changes you should make to your machine and network to mitigate attacks.
Week 2 Summary
You have reached the end of Week 2! In this activity, you will reflect on what you have covered so far.
Week 3
Network Monitoring and Preventative Measures Against Phishing
Welcome to Week 3!
In this step, you will find out what is in store for the week.
Logs and Auditing: Monitoring Software
In this section, you will learn how to use log files to gain insight into your network activity and how to use monitoring software to identify any suspicious activity.
Logs and Auditing: IP Addresses
In this section, you will learn about what IP addresses can tell you about hackers, but also what hackers can learn about you through your IP address! The use of proper monitoring can help protect you from these attacks.
Phishing and Spear Phishing
In this step, you will learn more about phishing attempts and how you can protect yourself from them.
Week 3 Summary
You have reached the end of Week 3! In this activity, you will reflect on what you have covered so far.
Week 4
How to Test Your Network and Recover from Attacks
The Final Week Ahead
In this week, you will learn how to test your network and recover from attacks.
Red Team and Blue Team Approach
In this section you will learn about the Red Team and Blue Team – key players in ethical hacking to test your network's security.
Tracking a Hacker (OSINT)
In this section you will learn about OSINT, a useful tool in protecting networks through shared data on hacking. You will also learn how to use IP addresses to help track down hackers.
Recovering from an Attack
In this section you will learn about what you need to do if your network is attacked. You will learn about what you need to do in advance to improve your chances of a full recovery.
Week 4 Summary
You have reached the end of Week 4! In this activity, you will reflect on what you have covered in this course.
Learning on this course
On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.
What will you achieve?
By the end of the course, you‘ll be able to...
- Explore why network security is important
- Identify phishing emails, bad links, and so on
- Assess how to prevent and recover from virus and ransomware attacks
- Explore how hackers recon your network
- Explore how to make your network a harder target
- Explore how to protect yourself and your company
Who is the course for?
This course offers a comprehensive guide to network security with video walk-throughs, making it suitable for both beginners and experienced users.
You don’t need any prior knowledge to join.
Learning on FutureLearn
Your learning, your rules
- Courses are split into weeks, activities, and steps to help you keep track of your learning
- Learn through a mix of bite-sized videos, long- and short-form articles, audio, and practical activities
- Stay motivated by using the Progress page to keep track of your step completion and assessment scores
Join a global classroom
- Experience the power of social learning, and get inspired by an international network of learners
- Share ideas with your peers and course educators on every step of the course
- Join the conversation by reading, @ing, liking, bookmarking, and replying to comments from others
Map your progress
- As you work through the course, use notifications and the Progress page to guide your learning
- Whenever you’re ready, mark each step as complete, you’re in control
- Complete 90% of course steps and all of the assessments to earn your certificate
Want to know more about learning on FutureLearn? Using FutureLearn