Welcome to the fourth of five courses in the Cisco Networking Basics Specialization.
In the first three courses of this specialization, you were focused on understanding how computer networks work and how to access the network. Now that you have a firm grasp of that, you can dive deeper into how do you actually build and secure a home network that includes lots of wireless devices. Wireless requires different configurations than a wired network. Both wireless and wired networks are susceptible to security threats and attacks. You will work through the different types of threats and attacks that typically occur and understand the different software tools that can be used to mitigate those security threats.
At the end of this course, you will be able to:
1. Build and secure a home wireless network.
2. Connect and configure a home wireless router in order to provide a secure connection to the Internet.
3. Describe different methods of connecting devices to a home network, including wired and wireless connections.
4. Explain how Wi-Fi communication is implemented in a small LAN environment.
5. Explain the inherent risks associated with wireless network connectivity.
6. Implement the best practices for securing wireless network access, including methods for secure authentication and encryption.
7. Describe common types of network security threats and attacks.
8. Explain how software tools can mitigate network security threats.
Building a Home Network In this module, you will compare different types of network connections, particularly those in a home network. Today's home networks consists of many different components that connect wirelessly through a router to the Internet. At the end of this module, you will be able to explain how Wi-Fi functions and how the home network manages all of those wireless conversations over the network.
Module 2: Connecting to the Internet In this module, you will setup a wireless home network and connect various wireless devices. You will also compare and contrast the various ways in which a home network can connect to an ISP for Internet services. A lab to change the wireless settings for a smartphone or other mobile device is included as well.
Module 3: Taking Security Seriously In this module, you will learn about the various attacks
Module 4: Securing the Network & User Devices In this module, you will learn about best practices in security to implement in a home network. Emphasis is placed explaining how the various security tools and operating system features are used to mitigate attacks. You are also exposed to how a simple firewall can be configured to filter or allow different types of traffic.
MOOCs stand for Massive Open Online Courses. These arefree online courses from universities around the world (eg. StanfordHarvardMIT) offered to anyone with an internet connection.
How do I register?
To register for a course, click on "Go to Class" button on the course page. This will take you to the providers website where you can register for the course.
How do these MOOCs or free online courses work?
MOOCs are designed for an online audience, teaching primarily through short (5-20 min.) pre recorded video lectures, that you watch on weekly schedule when convenient for you. They also have student discussion forums, homework/assignments, and online quizzes or exams.