Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

IBM

Network Security & Database Vulnerabilities

IBM via Coursera

Overview

This course gives you the background needed to understand basic network security. You will learn the about Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization. You will learn the network components that guard an organization from cybersecurity attacks. In addition to networking, you will learn about database vulnerabilities and the tools/knowledge needed to research a database vulnerability for a variety of databases including SQL Injection, Oracle, Mongo and Couch. You will learn about various security breach types associated with databases and organizations that define standards and provide tools for cybersecurity professionals. This course is intended for anyone who wants to gain a basic understanding of Network Security/Database Vulnerabilities or as the fourth course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst.

Syllabus

  • TCP/IP Framework
    • In this module, you will learn about the TCP/IP Framework, Ethernet and Lan Networks, and the basics around routing and switching. You will also learn about address translation and the basic differences between Intrusion Detection and Intrusion Prevention Systems. Finally, you will learn about network packets.
  • Basics of IP Addressing and the OSI Model
    • In this module, you will learn the basics of IP Addressing and how it affects the network traffic routing. You will about application and transport protocols. You will learn about firewalls and additional information in regards to Intrusion Detection and Intrusion prevention systems. Finally, you will learn the concepts of high availability and clustering.
  • Introduction to Databases
    • In this module you will learn to define data source and model types as well as types of data. You will also review how to use best practices to secure your organizations data. Finally, you will get an in depth look at use cases around an example of a Data Protection solution, IBM Security Guardium.
  • Deep Dive - Injection Vulnerability
    • In this module you will hear an IBM Subject Matter expert discuss the common vulnerability of Injection. You will learn the basics around OS Command Injection and SQL Injection.
  • Final Project

Taught by

IBM Security Learning Services

Reviews

4.7 rating at Coursera based on 3082 ratings

Start your review of Network Security & Database Vulnerabilities

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.