• EC-council logo

Advanced Cyber Security Training: Network Security

Learn how to identify, mitigate, prevent, and recover from network attacks and understand how to increase your network security.

  • Duration

    4 weeks
  • Weekly study

    3 hours

Understand the importance of network security

Cyber attacks on your business or home network can have devastating results. This four-week course will give you the knowledge and skills to identify and prevent these attacks, as well as helping you increase your network security.

Using a practical approach to cyber security, you’ll learn how to deal with the growing problem of network attacks and understand how malicious hackers could break into your network.

Learn how to identify types of network attacks

On this course, you’ll build your understanding of network security and how to deal with disaster recovery, should a network attack happen.

You’ll start with an introductionto the different types of attackers and network attacks that occur, including phishing, spear phishing, DDOS, and ransomware.

You’ll also learn vital techniques to help you recover from an attack.

Conduct threat assessment scanning and learn how to use security tools

Having understood the theory of network attacks, you’ll use a hands-on approach to strengthen your knowledge.

You’ll discover and use the tools needed to conduct threat assessment scanning including Nmap, Spiderfoot, OpenVas and Nessus.

You’ll also understand how to carry out a penetration test using ExploitDB.

Learn how to use OSINT and how to secure your network

Using OSINT tools (open-source intelligence), you’ll learn how to gather intelligence on the attacker, allowing you to narrow down potential vulnerabilities and understand how hackers recon your network.

These transferable cyber security skills can then be used to increase the security in your network, making it a harder target for potential attackers.

Syllabus

  • Week 1

    Is My Network Really Under Attack?

    • Figure in dark hood wearing a mask working on a laptop

      Welcome to Network Security

      In these steps, you will be introduced to your educator and learn what to expect in the coming week.

    • Burglar sitting in a car using a laptop

      Introduction to Network Threats

      In this activity, you will learn about your risk level and typical types of network attacks.

    • Hand grabbing network fiber optic cables

      How a Malicious Hacker Goes About Breaking into Your Network: Physical Attacks and Man in the Middle Attacks

      How a Malicious Hacker Goes About Breaking into Your Network: Physical Attacks and Man in the Middle Attacks

    • Pixelated image of a criminal in a ski mask

      How a Malicious Hacker Goes About Breaking into Your Network: Social Engineering

      In this section you will learn about how hackers use social engineering to access your network, and what you can do to identify and prevent these attacks.

    • Police officer standing in front of hologram screens defending binary code

      Week 1 Summary

      You have reached the end of Week 1! Let’s reflect on what you have covered so far.

  • Week 2

    How to Securing Your Network from Within

    • Concept image depicting digital protection

      Welcome to Week 2!

      Find out what is in store for this week.

    • Office workers point to icon representing cyber security and network protection

      Securing Your Network Through Your Users

      In this section you will learn about the importance of educating your network users to keep your network secure.

    • Hand typing on a laptop keyboard

      Securing Your Machine: Common Ways in for Hackers

      In this section you will learn about several threat types and important practices to protect your machine and your network from threats.

    • Laptop screen with image of lock

      Securing Your Machine: Changes You Should Make

      In this section, you will learn about changes you should make to your machine and network to mitigate attacks.

    • Key with overlay of circuit on background of encrypted text

      Week 2 Summary

      You have reached the end of Week 2! In this activity, you will reflect on what you have covered so far.

  • Week 3

    Network Monitoring and Preventative Measures Against Phishing

    • Fishing hook baited with an @ symbol on a circuit board

      Welcome to Week 3!

      In this step, you will find out what is in store for the week.

    • Two people reviewing a computer screen.

      Logs and Auditing: Monitoring Software

      In this section, you will learn how to use log files to gain insight into your network activity and how to use monitoring software to identify any suspicious activity.

    • Magnifying glass finding fingerprint in binary background

      Logs and Auditing: IP Addresses

      In this section, you will learn about what IP addresses can tell you about hackers, but also what hackers can learn about you through your IP address! The use of proper monitoring can help protect you from these attacks.

    • Digital mail icons

      Phishing and Spear Phishing

      In this step, you will learn more about phishing attempts and how you can protect yourself from them.

    • Icon of mail connecting to icons of people.

      Week 3 Summary

      You have reached the end of Week 3! In this activity, you will reflect on what you have covered so far.

  • Week 4

    How to Test Your Network and Recover from Attacks

    • Woman looking through transparent screen overlayed with data and text

      The Final Week Ahead

      In this week, you will learn how to test your network and recover from attacks.

    • Blue and red figures in foosball table

      Red Team and Blue Team Approach

      In this section you will learn about the Red Team and Blue Team – key players in ethical hacking to test your network's security.

    • Abstract graphic of globe, showing global connection lines

      Tracking a Hacker (OSINT)

      In this section you will learn about OSINT, a useful tool in protecting networks through shared data on hacking. You will also learn how to use IP addresses to help track down hackers.

    • Man in server room.

      Recovering from an Attack

      In this section you will learn about what you need to do if your network is attacked. You will learn about what you need to do in advance to improve your chances of a full recovery.

    • Graphic of shield and circuitry

      Week 4 Summary

      You have reached the end of Week 4! In this activity, you will reflect on what you have covered in this course.

Learning on this course

On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.

What will you achieve?

By the end of the course, you‘ll be able to...

  • Explore why network security is important
  • Identify phishing emails, bad links, and so on
  • Assess how to prevent and recover from virus and ransomware attacks
  • Explore how hackers recon your network
  • Explore how to make your network a harder target
  • Explore how to protect yourself and your company

Who is the course for?

This course offers a comprehensive guide to network security with video walk-throughs, making it suitable for both beginners and experienced users.

You don’t need any prior knowledge to join.

Who developed the course?

EC-council logo

EC-Council

International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body.

Learning on FutureLearn

Your learning, your rules

  • Courses are split into weeks, activities, and steps to help you keep track of your learning
  • Learn through a mix of bite-sized videos, long- and short-form articles, audio, and practical activities
  • Stay motivated by using the Progress page to keep track of your step completion and assessment scores

Join a global classroom

  • Experience the power of social learning, and get inspired by an international network of learners
  • Share ideas with your peers and course educators on every step of the course
  • Join the conversation by reading, @ing, liking, bookmarking, and replying to comments from others

Map your progress

  • As you work through the course, use notifications and the Progress page to guide your learning
  • Whenever you’re ready, mark each step as complete, you’re in control
  • Complete 90% of course steps and all of the assessments to earn your certificate

Want to know more about learning on FutureLearn? Using FutureLearn

Learner reviews