Connect and Protect: Networks and Network Security
- coledetrick
- Jul 30, 2023
- 2 min read
I finished the 3rd module in Google's Cyber security certification program and my thoughts were that this module was much more technically compact than previous modules, however, I enjoyed it. I can see why this is typically the module most people lose interest in because it takes a deeper thinking process to visualize the structure of a network and you have to be willing to watch each video more than once or do your own independent research on Networks to have a full, deep grasp on the more complex topics. This could also be a byproduct of my being very interested in network security and engineering and wanting to dive deeper into these concepts than Google intended. To sum up, the knowledge I learned taking this course I would breaking it up like this:
- Network Fundamentals: This section covered the basics of networking, including OSI and TCP/IP models, networking protocols (e.g., HTTP, DNS, FTP), subnetting, IP addressing, and network topologies. 
- Network Devices and Technologies: I learned about various network devices, such as routers, switches, firewalls, and load balancers. Understanding their functionalities and how to configure them is crucial for securing networks effectively. 
- Network Architecture and Design: This part involved planning and designing secure network infrastructures. Topics included VLANs, DMZ (Demilitarized Zone), VPN (Virtual Private Network), and network segmentation. 
- Network Access Control: This section focused on controlling and managing access to the network. It covered technologies like AAA (Authentication, Authorization, and Accounting), RADIUS, TACACS+, and implementing secure access policies. 
- Firewalls and Intrusion Detection/Prevention: I learned about firewall technologies, including stateful and stateless firewalls. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) and how they detect and respond to network threats. 
- Secure Network Protocols: This topic covered the secure implementation of various network protocols, such as HTTPS, SSH, and SNMPv3, to protect data during transmission. 
- Wireless Network Security: This section showed me why understanding the vulnerabilities of wireless networks and learning how to secure them is vital in the age of Wi-Fi. Topics included WPA2/WPA3, EAP (Extensible Authentication Protocol), and wireless encryption. 
- Network Monitoring and Incident Response: I learned about monitoring network traffic for suspicious activities and how to respond to security incidents effectively. 
- Virtualization and Cloud Network Security: This section covered the security challenges specific to virtualized and cloud-based environments, and how to implement security measures in such settings. 
- Security Best Practices: Throughout the course, I was introduced to various security best practices, such as the principle of least privilege, regular software updates, and continuous security monitoring. 




Comments