Network Security and Defence: Network Environments
Deepen your learning of network defence management with this course on network environments, created by Coventry University.
Duration
2 weeks
Weekly study
5 hours
100% online
How it works
Included in an ExpertTrack
Course 3 of 5
Get full ExpertTrack access
Find out more
Established
1992
Location
Coventry
Global connectivity requires organisations to consider who they connect their networks with, what data they hold and who else can access it. With this, comes risk. In this short course, you’ll have the opportunity to learn how to successfully evaluate network risk and create secure networks.
A network defence manager must be able to assess the risks to a network, manage them appropriately and understand that not all options are negotiable.
This course will develop your knowledge of what to consider when it comes to network defence management and the regulatory requirements that organisational networks must comply with. This includes the physical elements and organisational factors, such as connectivity, budget and risk and response.
Key to this course is introducing network environments, which generate large numbers of security events and log data via firewalls, network routers, servers and anti-malware systems.
In the second week, you’ll have the opportunity to add real life context by looking at case studies of four different councils, and see how your learning so far relates to these examples.
Welcome to a new week of Network Defence Management.
In this section, we look at the physical elements of network defence management.
In this activity, we examine some of the factors affecting organisational approaches to network defence management.
In this activity, we consider regulations affecting network defence management requirements.
A review of the week and your chance to reflect on your learning.
Welcome back to a new week of Network Defence Management.
In this activity, we examine the 'insider threat' and consider organisational training for NDM.
In this activity, we take a look at four different cyber-attack case studies.
A review of the week and your chance to reflect on your learning.
More courses you might like
Learners who joined this course have also enjoyed these courses.
©2025 onlincourse.com. All rights reserved