top of page

Connect and Protect: Networks and Network Security

I finished the 3rd module in Google's Cyber security certification program and my thoughts were that this module was much more technically compact than previous modules, however, I enjoyed it. I can see why this is typically the module most people lose interest in because it takes a deeper thinking process to visualize the structure of a network and you have to be willing to watch each video more than once or do your own independent research on Networks to have a full, deep grasp on the more complex topics. This could also be a byproduct of my being very interested in network security and engineering and wanting to dive deeper into these concepts than Google intended. To sum up, the knowledge I learned taking this course I would breaking it up like this:

  1. Network Fundamentals: This section covered the basics of networking, including OSI and TCP/IP models, networking protocols (e.g., HTTP, DNS, FTP), subnetting, IP addressing, and network topologies.

  2. Network Devices and Technologies: I learned about various network devices, such as routers, switches, firewalls, and load balancers. Understanding their functionalities and how to configure them is crucial for securing networks effectively.

  3. Network Architecture and Design: This part involved planning and designing secure network infrastructures. Topics included VLANs, DMZ (Demilitarized Zone), VPN (Virtual Private Network), and network segmentation.

  4. Network Access Control: This section focused on controlling and managing access to the network. It covered technologies like AAA (Authentication, Authorization, and Accounting), RADIUS, TACACS+, and implementing secure access policies.

  5. Firewalls and Intrusion Detection/Prevention: I learned about firewall technologies, including stateful and stateless firewalls. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) and how they detect and respond to network threats.

  6. Secure Network Protocols: This topic covered the secure implementation of various network protocols, such as HTTPS, SSH, and SNMPv3, to protect data during transmission.

  7. Wireless Network Security: This section showed me why understanding the vulnerabilities of wireless networks and learning how to secure them is vital in the age of Wi-Fi. Topics included WPA2/WPA3, EAP (Extensible Authentication Protocol), and wireless encryption.

  8. Network Monitoring and Incident Response: I learned about monitoring network traffic for suspicious activities and how to respond to security incidents effectively.

  9. Virtualization and Cloud Network Security: This section covered the security challenges specific to virtualized and cloud-based environments, and how to implement security measures in such settings.

  10. Security Best Practices: Throughout the course, I was introduced to various security best practices, such as the principle of least privilege, regular software updates, and continuous security monitoring.


Comments


bottom of page