Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.


Cyber Network Security

via Cybrary


This Cyber Network Security course will cover fundamental knowledge of the incident response process and business continuity planning. Students will also learn about malware, common attack vectors, and learn to use Windows firewall.


This course is designed for beginners who have little or no knowledge of network security but do have knowledge in basic network concepts. It will be assumed that the learners of this course have a firm basis in network terminology, an understanding of protocols and hardware devices, and a general idea of how information is sent through the network from one place to another. It is preferred the learners take the Network Concepts and Network Infrastructure sections of this course before moving on to this section.

Course Goals

By the end of this course, students should be able to:

  • Know and explain the foundational principles of cybersecurity and how everything done in network security can be traced back to those principles
  • Understand the dangers which networks face every day
  • Handle data, risk, and informational assets in a secure manner and know why these are critical applications
  • Look at a network architecture and determine if the network is secure
  • Understand how staying up to date in network security practices makes network security a lot easier
  • Demonstrate abilities in securing hardware components to protect networks
  • Be aware of why all parts of network security relate to each other and be aware of the consequences when there is a breakdown between the parts

In the Cyber Network Security training course, students will be introduced to the fundamentals of cybersecurity principles, learning about types of threats, regulations, and ethical concerns, as well as malware, common attack vectors, and using firewalls.

What is Cyber Network Security?

Network security is a part of cybersecurity that has a goal of protecting data that is sent through devices in a network from being intercepted or changed. Network security should defend an organization’s IT infrastructure from various types of cyber threats and attacks including:

  • Spyware and adware
  • Hacker attacks
  • Viruses, Trojan horses, and worms
  • Zero-day attacks
  • Denial of services attacks

The network security team of an organization will typically implement the hardware and software that is needed to guard the IT infrastructure. When the appropriate network security is in place, systems can detect emerging threats before they are able to infiltrate networks and compromise data.

When network security is compromised, the primary priority should be to get attackers out as quickly as possible. The longer they are in the network, the more private data they have time to steal.

What Does this Cyber Network Security Course Cover?

In this Cyber Network Security course, students will first cover an examination of cybersecurity principles, learning about cyber threats, regulations, and ethical aspects of cybersecurity. They will then learn about the incident response process, business continuity planning, and cybersecurity topics like malware, common attack vectors, and using Windows firewall.

The course will cover the following objectives, which students should master during the course:

  • Thorough understanding of the dangers that networks encounter daily
  • Knowledge of the basic principles of cybersecurity and how network security relates to those principles
  • Handling risk, data, and informational assets securely and understand why these are crucial applications
  • Understanding of why staying updated on network security practices is important
  • Ability to identify whether a network is secure by looking at network architecture
  • Ability to secure hardware components to help protect networks
  • Understanding of how different aspects of network security relate to one another and how any breakdown between those parts affects overall information security

Upon completing the course, students will have earned 4 CEU/CPE and a Certificate of Completion for 3 hours and 20 minutes of actual clock time.

Who Should Take the Cyber Network Security Course?

This Cyber Network Security course is aimed at students who have knowledge of basic network concepts, but little or no knowledge of network security. Students should have a good grasp of network terminology, protocols and hardware devices, and general knowledge of how information moves through a network.

There are no prerequisites for this course.

Why is Networking Important in Cybersecurity?

There is a growing reliance on technology worldwide. As a result, it’s becoming more important to have ways to secure online data and information. As technology advances and computer networks become larger, data protection and integrity have become some of the most important security aspects for organizations to consider, making network security extremely important in this digital age.

No matter how large or small an organization is, if it uses the internet (LAN or other method), its network security is critical to the overall safety and success of the company. While there is no network that is completely immune to cyberattacks, efficient and stable network security systems are vital to protecting important data. An effective network security system will help an organization reduce risks of data sabotage and theft.

Additionally, network security is important because it helps protect an organizations’ workstations from dangerous spyware. It ensures that shared data is secure, and that network infrastructure provides various levels of protection to prevent cyberattacks. It achieves this by breaking down information into multiple parts, encrypts the parts, and transmits them through different paths. This type of network security is essential in guarding against digital eavesdropping.

How is it Best to Learn Cyber Network Security?

Students and IT professionals who are interested in learning more about network security will find this training course ideal. It’s a beginning level course that offers fundamental information about network security, its purpose, application, and importance.

This, and all Cybrary online courses, are facilitated by industry experts, so students are assured to get the most relevant and important information to apply at their organizations. All of our courses are online, so students can work at their own pace, on their own schedule. Enrolling in the Cyber Network Security course is simple, just click on the Register button at the top of the screen.


  • Introduction
    • Introduction and Overview
  • Core Knowledge
    • The Pillars of Cybersecurity Part 1
    • The Pillars of Cybersecurity Part 2
    • Key Principles of Cybersecurity
    • Threats, Regulations, and Ethics of Cybersecurity
    • Module 2 Conclusion
  • Knowledge of Applications
    • Data Leakage Prevention
    • Incident Response Processes, Teams, and Policies Part 1
    • Incident Response Processes, Teams, and Policies Part 2
    • Disaster Recovery and Business Continuity
    • Module 3 Conclusion
  • Design Knowledge
    • Network Structure Part 1
    • Network Structure Part 2
    • Network Architecture Models
    • Common Attack Vector Strategies
    • Module 4 Conclusion
  • The Application of Designs
    • Malware and Cyber Awareness Part 1
    • Malware and Cyber Awareness Part 2
    • Maintaining and Improving Network Security Practices
    • Module 5 Conclusion
  • The Application of Network Devices
    • Using Computer Protection Components
    • Using Network Protection Components Part 1
    • Using Network Protection Components Part 2
    • Windows Firewall Demo Part 1
    • Windows Firewall Demo Part 2
    • Windows Firewall Demo Part 3
    • Module 6 Conclusion
  • Conclusion
    • Conclusion and Summary

Taught by

Pete Cipolone


Start your review of Cyber Network Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.