Network Security and Defence: Security Architecture

Posted 3 years 9 months ago by Coventry University

Study Method : Online
Duration : 2 weeks
Subject : IT & Computer Science
Overview
Explore the layers of network security architecture and how to manage them before, during, and after an event.
Course Description

Explore the importance of layered network security

It’s important for anyone working in network defence management to understand security architecture, because it allows you to segregate differing trust domains via security devices.

This course will explore anti-virus software, malware protection, cryptographic techniques and applications, intrusion detection systems configuration, testing and maintaining firewalls, access control, network hardening and wi-fi security.

You will have the opportunity to grow your understanding of how these elements work together to create a secure network, and how you can apply the theory to real-life situations.

Explore network defence devices like firewalls and anti-malware systems

This course explores and analyses various management tools and techniques. You will come to understand that any single defence is likely to fail at some point. That’s why layered defence is necessary.

You’ll look at defining trust domains, zoning, security protection and how to implement security requirements.

Explore how to maintain network defence operations

During the course, you’ll also study maintenance and response strategies, and explore holistic approaches to network defence management, as well as maintenance, monitoring, resilience and redundancy and testing.

This course is for anyone looking to build their understanding of cyber security and network defence management.

Requirements

This course is for anyone looking to build their understanding of cyber security and network defence management.

Career Path
  • Demonstrate an understanding of the layers within a network defence management architectural framework
  • Explore the implications for both physical and logical defence strategies
  • Demonstrate an understanding of tools and techniques to manage the crisis event and maintain business continuity
  • Identify how to close a crisis event