In today’s interconnected world, securing networks is more critical than ever. This course empowers learners to gain essential tools and strategies needed to defend computer networks and data from cyber threats. You’ll dive into key topics such as firewalls, VPNs, access controls, and security monitoring, learning how each one contributes to a safe and resilient IT environment.
通过 Coursera Plus 解锁访问 10,000 多门课程。开始 7 天免费试用。

您将学到什么
Learn how access control lists (ACLs) are configured to control network traffic flow
Know how GBP, NAC, and 802.1x set and enforce network security policies
Understand firewalls, VPNs, AAA, and RBAC in securing and managing network access
您将获得的技能
要了解的详细信息

添加到您的领英档案
December 2025
6 项作业
了解顶级公司的员工如何掌握热门技能

积累特定领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 获得可共享的职业证书

该课程共有6个模块
One of the common approaches to implementing rule-based security is by configuring access control lists (ACLs). ACLs can be configured on a wide range of networking devices like routers, switches, firewalls, and wireless access points. In this topic, you will learn about the use of access control lists to enhance the security of your network.
涵盖的内容
2个视频3篇阅读材料1个作业
Network security and access control mechanisms are essential to protect the sensitive data and resources of organizations. Three important components that play a vital role in achieving this objective are Group-Based Policy (GBP), Network Access Control (NAC), and 802.1X. In this module, you will learn about this powerful trio, which forms a comprehensive approach to modern network security.
涵盖的内容
2个视频2篇阅读材料1个作业
In this module, you will learn about two essential components of network security that work together to safeguard networks from cyber threats: firewall and the intrusion prevention system (IPS).
涵盖的内容
1个视频1篇阅读材料1个作业
In this module, you will learn about virtual private network (VPN) technology and how it creates a secure tunnel to offer privacy and safety to users.
涵盖的内容
2个视频1篇阅读材料1个作业
To ensure the strong security, confidentiality, and safety of the resources, systems, and data, it is important to provide the right set of access controls to users. By implementing effective access control, businesses can reduce the risk of data breaches, unauthorised modifications, and other security incidents. In this module, you will learn about two popular access control mechanisms: authentication, authorization, and accounting (AAA) and Role-Based Access Control (RBAC).
涵盖的内容
1个视频1篇阅读材料1个作业
涵盖的内容
1篇阅读材料1个作业
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
位教师

从 Networking 浏览更多内容

Cisco Learning and Certifications
人们为什么选择 Coursera 来帮助自己实现职业发展




常见问题
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,



