This course focuses on networking basics as they relate to cybersecurity. To better understand how security is integrated into our networks, the first step is to have understanding of the information flow. We'll take a look at that by looking at how our protocols operate. There are many types of attacks and defense systems that we have to worry about and information flow can help you understand where there are weaknesses and where there are vulnerabilities that must be addressed. We’ll discuss how this is often a very good place to start when looking into a cyber security violation.
Basic understanding of networking terminology and applications, intranet and internet services, protocols, ports, as well as networking and security devices.
Basic knowledge in installation of security software, such as antivirus or firewalls, and general understanding of operating systems functionalities (Windows and Linux).
James Michael Stewart
Michael has over 30 years experience with computers and technology with a focus on security, certification, and various operating systems. He has been teaching job skills and certification courses on topics like CISSP, ethical hacking and penetration testing, computer forensics, and Security Plus for over 20 years. He is also the primary author of two books and holds a variety of certifications including CISSP, CEH, CHFI, ECSA, and Security Plus.