Network Security and Defence: Network Environments

Deepen your learning of network defence management with this course on network environments, created by Coventry University.

Duration

2 weeks

Weekly study

5 hours

100% online

How it works

Included in an ExpertTrack

Course 3 of 5

Get full ExpertTrack access

Find out more

Established

1992

Location

Coventry

Explore a range of stakeholders and regulations that can influence defence

Global connectivity requires organisations to consider who they connect their networks with, what data they hold and who else can access it. With this, comes risk. In this short course, you’ll have the opportunity to learn how to successfully evaluate network risk and create secure networks.

Explore network risk management

A network defence manager must be able to assess the risks to a network, manage them appropriately and understand that not all options are negotiable.

This course will develop your knowledge of what to consider when it comes to network defence management and the regulatory requirements that organisational networks must comply with. This includes the physical elements and organisational factors, such as connectivity, budget and risk and response.

Consider the implications of different network environments

Key to this course is introducing network environments, which generate large numbers of security events and log data via firewalls, network routers, servers and anti-malware systems.

Deepen your learning with network security case studies

In the second week, you’ll have the opportunity to add real life context by looking at case studies of four different councils, and see how your learning so far relates to these examples.

  • Week 1

    Key Network Defence Management Considerations

    • Welcome to Network Defence Management: Network Environments

      Welcome to a new week of Network Defence Management.

    • Physical elements

      In this section, we look at the physical elements of network defence management.

    • Organisational factors

      In this activity, we examine some of the factors affecting organisational approaches to network defence management.

    • Regulations

      In this activity, we consider regulations affecting network defence management requirements.

    • Summary of the week

      A review of the week and your chance to reflect on your learning.

  • Week 2

    The Bad Side of Network Defence Management

    • Welcome back

      Welcome back to a new week of Network Defence Management.

    • Internal factors

      In this activity, we examine the 'insider threat' and consider organisational training for NDM.

    • Cyber-attack case studies

      In this activity, we take a look at four different cyber-attack case studies.

    • A summary of the week

      A review of the week and your chance to reflect on your learning.

More courses you might like

Learners who joined this course have also enjoyed these courses.

©2025  onlincourse.com. All rights reserved