Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

The Open University

Network security

The Open University via OpenLearn

Overview

Encryption of files and firewalls are just some of the security measures that can be used in security. This free course, Network security, which assumes you have a substantial knowledge of computing, helps to explain the intricacies of the continually changing area of network security by studying the main issues involved in achieving a reasonable degree of resilience against attacks.

Syllabus

  • Introduction
  • Learning outcomes
  • 1 Terminology and abbreviations
  • 1 Terminology and abbreviations
  • 1.1 Terminology
  • 1.2 Abbreviations
  • 2 Background to network security
  • 2 Background to network security
  • 2.1 Introduction
  • 2.2 The importance of effective network security strategies
  • 2.3 Network security when using your computer
  • 3 Threats to communication networks
  • 3 Threats to communication networks
  • 3.1 How have network security measures developed over the past fifty years?
  • 3.2 Important terminology and information for making the most of this section
  • 3.3 Passive attacks
  • 3.4 Active attacks
  • 3.5 Potential network vulnerabilities
  • 3.6 Tapping into transmission media
  • 4 Principles of encryption
  • 4 Principles of encryption
  • 4.1 An introduction to encryption and cryptography
  • 4.2 An overview of symmetric key systems
  • 4.3 The components of a symmetric key system
  • 4.4 Asymmetric key systems
  • 4.5 Vulnerability to attack
  • 4.6 Hybrid systems
  • 5 Implementing encryption in networks
  • 5 Implementing encryption in networks
  • 5.1 Overview
  • 5.2 Link layer encryption
  • 5.3 End-to-end encryption
  • 5.3.1 Network layer encryption
  • 5.3.2 Application layer encryption
  • 5.4 Link layer encryption and end-to-end encryption compared and combined
  • 6 Integrity
  • 6 Integrity
  • 6.1 Encryption and integrity
  • 6.2 Other ways of providing assurance of integrity
  • 7 Freshness
  • 7 Freshness
  • 7.1 Introduction
  • 7.2 Time stamps
  • 7.3 Sequence numbers
  • 7.4 Nonces
  • 8 Authentication
  • 8 Authentication
  • 8.1 Overview of authentication methods
  • 8.2 Certification authorities and digital certificates
  • 9 Access control
  • 9 Access control
  • 9.1 Introduction
  • 9.2 Passwords
  • 9.3 Firewalls – an overview
  • 9.4 Packet-filtering router
  • 9.5 Application level gateways
  • 9.6 Circuit level gateways
  • 9.7 Examples of firewall implementation
  • Conclusion
  • 10.1 Summary of Sections 1–5
  • 10.2 Summary of Sections 6–9
  • References
  • Acknowledgements

Reviews

5.0 rating, based on 2 Class Central reviews

4.7 rating at OpenLearn based on 33 ratings

Start your review of Network security

  • Profile image for Raphael Amofa-Baah
    Raphael Amofa-Baah
    My review on a Computer Systems Security course I just took.
    I recently completed a course on Computer Systems Security offered by an online platform. The course covered various topics such as cryptography, authentication, network security, web security, malware analysis, and system security. The course was well-structured and engaging. The instructors were knowledgeable and clear and helpful. I learned a lot from this course and I would recommend it to anyone who is interested in learning more about computer systems security.
    I really enjoyed the program. I will make time and do more and will also introduce it to others
  • Arzoo Saleem
    Networking is an essential field in the modern world, as it deals with the communication and connection of devices, systems, and people through various technologies and protocols. There are many free courses available online that cover the basics of networking, as well as more advanced topics. Here are some general thoughts on networking courses:

    Content: The quality and comprehensiveness of the course content are crucial factors to consider when evaluating a networking course. A good course should cover the foundational concepts of networking, such as network architecture, protocols, topologies, and security, and also provide hands-on exercises and real-world examples.

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.