Connect and Protect: Networks and Network Security

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Dive into the world of networks and network security with this Google Cyber Security certification course, completely **free** on Theetay! This comprehensive course is part of Google’s renowned cybersecurity training program, designed to equip you with the skills needed for an entry-level cybersecurity job.

Building upon the knowledge gained in the previous courses, this module delves into the intricacies of connecting and securing networks. You’ll explore foundational network operations and protocols, including the Transmission Control Protocol/Internet Protocol (TCP/IP) model. Discover how network hardware, such as routers and modems, facilitate communication on the internet.

Learn how to identify network vulnerabilities and understand the importance of securing sensitive information from cyberattacks. Explore essential security measures like firewalls, system hardening, and virtual private networks (VPNs).

Led by Google cybersecurity experts, this course utilizes videos, hands-on activities, and real-world examples to foster your practical skills. Upon completion, you’ll be prepared for entry-level cybersecurity roles.

**Key Learnings:**

  • Understand the structure of various computer networks
  • Master the art of sending and receiving data over networks
  • Gain knowledge of common network protocols
  • Identify and implement common network security measures and protocols
  • Learn how to protect networks against intrusion tactics
  • Compare and contrast local networks with cloud computing
  • Explore different system hardening techniques

This course is available for **free** on Theetay. Enroll now and enhance your cybersecurity knowledge with Google’s expertise!

**Note:** This course is offered on platforms like **Udemy**, **Udacity**, **Coursera**, **MasterClass**, **NearPeer**, and more, all completely free on Theetay.

Show More

What Will You Learn?

  • Define types of networks and network components
  • Show how to send and receive data over the network
  • Learn how to secure your network against intrusion tactics
  • Describe system hardening techniques

Course Content

Connect and Protect Networks and Network Security

  • A Message from the Professor
  • 003 01_introduction-to-course-3.mp4
    00:00
  • 004 02_course-3-overview_instructions.html
    00:00
  • 006 03_helpful-resources-and-tips_instructions.html
    00:00
  • 009 01_welcome-to-week-1.mp4
    00:00
  • 012 02_chris-my-path-to-cybersecurity.mp4
    00:00
  • 015 03_what-are-networks.mp4
    00:00
  • 018 04_tina-working-in-network-security.mp4
    00:00
  • 021 05_emmanuel-useful-skills-for-network-security.mp4
    00:00
  • 024 06_network-tools.mp4
    00:00
  • 025 07_network-components-devices-and-diagrams_instructions.html
    00:00
  • 028 08_cloud-networks.mp4
    00:00
  • 029 09_cloud-computing-and-software-defined-networks_instructions.html
    00:00
  • 030 10_test-your-knowledge-introduction-to-networks_quiz.html
    00:00
  • 033 01_introduction-to-network-communication.mp4
    00:00
  • 036 02_the-tcp-ip-model.mp4
    00:00
  • 039 03_the-four-layers-of-the-tcp-ip-model.mp4
    00:00
  • 040 04_learn-more-about-the-tcp-ip-model_instructions.html
    00:00
  • 041 05_the-osi-model_instructions.html
    00:00
  • 042 06_test-your-knowledge-network-communication_quiz.html
    00:00
  • 045 01_ip-addresses-and-network-communication.mp4
    00:00
  • 046 02_components-of-network-layer-communication_instructions.html
    00:00
  • 047 03_test-your-knowledge-local-and-wide-network-communication_quiz.html
    00:00
  • 050 01_wrap-up.mp4
    00:00
  • 051 02_glossary-terms-from-week-1_instructions.html
    00:00
  • 052 03_weekly-challenge-1_exam.html
    00:00
  • 055 01_welcome-to-week-2.mp4
    00:00
  • 058 02_network-protocols.mp4
    00:00
  • 059 03_common-network-protocols_instructions.html
    00:00
  • 060 04_additional-network-protocols_instructions.html
    00:00
  • 061 05_test-your-knowledge-recognize-different-network-protocols_quiz.html
    00:00
  • 064 06_wireless-protocols.mp4
    00:00
  • 065 07_the-evolution-of-wireless-security-protocols_instructions.html
    00:00
  • 068 01_firewalls-and-network-security-measures.mp4
    00:00
  • 071 02_virtual-private-networks-vpns.mp4
    00:00
  • 074 03_security-zones.mp4
    00:00
  • 075 04_subnetting-and-cidr_instructions.html
    00:00
  • 078 05_proxy-servers.mp4
    00:00
  • 079 06_virtual-networks-and-privacy_instructions.html
    00:00
  • 080 07_test-your-knowledge-system-identification_quiz.html
    00:00
  • 083 01_wrap-up.mp4
    00:00
  • 084 02_glossary-terms-from-week-2_instructions.html
    00:00
  • 085 03_weekly-challenge-2_exam.html
    00:00
  • 088 01_welcome-to-week-3.mp4
    00:00
  • 091 02_the-case-for-securing-networks.mp4
    00:00
  • 092 03_how-intrusions-compromise-your-system_instructions.html
    00:00
  • 095 01_denial-of-service-dos-attacks.mp4
    00:00
  • 096 02_read-tcpdump-logs_instructions.html
    00:00
  • 097 03_activity-analyze-network-layer-communication_quiz.html
    00:00
  • 098 04_real-life-ddos-attack_instructions.html
    00:00
  • 099 05_test-your-knowledge-secure-networks-against-denial-of-service-dos-attacks_quiz.html
    00:00
  • 102 01_malicious-packet-sniffing.mp4
    00:00
  • 105 02_ip-spoofing.mp4
    00:00
  • 106 03_overview-of-interception-tactics_instructions.html
    00:00
  • 107 04_activity-analyze-network-attacks_quiz.html
    00:00
  • 108 05_test-your-knowledge-network-interception-attack-tactics_quiz.html
    00:00
  • 111 01_wrap-up.mp4
    00:00
  • 112 02_glossary-terms-from-week-3_instructions.html
    00:00
  • 113 03_weekly-challenge-3_exam.html
    00:00
  • 116 01_welcome-to-week-4.mp4
    00:00
  • 119 02_security-hardening.mp4
    00:00
  • 122 01_os-hardening-practices.mp4
    00:00
  • 123 02_brute-force-attacks-and-os-hardening_instructions.html
    00:00
  • 124 03_activity-apply-os-hardening-techniques_quiz.html
    00:00
  • 125 04_test-your-knowledge-os-hardening_quiz.html
    00:00
  • 128 01_network-hardening-practices.mp4
    00:00
  • 129 02_network-security-applications_instructions.html
    00:00
  • 130 03_activity-analysis-of-network-hardening_quiz.html
    00:00
  • 131 04_test-your-knowledge-network-hardening_quiz.html
    00:00
  • 134 01_network-security-in-the-cloud.mp4
    00:00
  • 137 02_kelsey-cloud-security-explained.mp4
    00:00
  • 138 03_secure-the-cloud_instructions.html
    00:00
  • 139 04_test-your-knowledge-cloud-hardening_quiz.html
    00:00
  • 142 01_wrap-up.mp4
    00:00
  • 143 02_glossary-terms-from-week-4_instructions.html
    00:00
  • 144 03_weekly-challenge-4_exam.html
    00:00
  • 145 04_portfolio-activity-use-the-nist-cybersecurity-framework-to-respond-to-a-security_exam.html
    00:00
  • 148 01_course-wrap-up.mp4
    00:00
  • 150 02_course-3-glossary_instructions.html
    00:00
  • 151 03_get-started-on-the-next-course_instructions.html
    00:00
  • 152 01__resources.html
    00:00

Earn a certificate

Add this certificate to your resume to demonstrate your skills & increase your chances of getting noticed.

selected template

Student Ratings & Reviews

No Review Yet
No Review Yet

Want to receive push notifications for all major on-site activities?

×