
Course overview
How to Design and Secure Computer Networks
49 modules
·198 lessons
·—
Part 1
Part 2
Part 3
Part 4
Part 5
Part 6
Part 7
Part 8
Part 9
Part 10
Part 11
Part 12
Part 13
Part 14
Part 15
Part 16
Part 17
Part 18
Application Protocols as Security Boundaries
Part 19
Logical Segmentation and Zoning
Part 20
Perimeter, DMZ, and Hybrid Border Patterns
Part 21
Data Center, Campus, and Cloud Network Designs
Part 22
Segmentation for Security and Containment
Part 23
Identity-Aware and Zero-Trust-Inspired Approaches
Part 24
Security Objectives and Policy
Part 25
Trust Boundaries and Threat Modeling Basics
Part 26
Authentication, Authorization, and Accounting
Part 27
Security Controls Across Network Layers
Part 28
Resilience and Availability as Security Concerns
Part 29
Part 30
Reconnaissance and Discovery (High-Level)
Part 31
Initial Access and Perimeter Breaches
Part 32
Lateral Movement and Internal Recon
Part 33
Common Attack Categories and Mitigation Patterns
Part 34
Security Testing and Validation (High-Level)
Part 35
Network Telemetry and Observability
Part 36
IDS/IPS and Network Security Sensors
Part 37
Centralized Logging and Correlation
Part 38
Threat Hunting and Anomaly Detection
Part 39
Monitoring for Performance and Reliability
Part 40
Incident Response Lifecycle
Part 41
Containment Strategies in Network Incidents
Part 42
Hardening Network Infrastructure
Part 43
Designing Secure and Resilient Architectures
Part 44
Governance, Compliance, and Continuous Improvement
Part 45
Reference Architectures for Secure Networks
Part 46
Network Design Patterns
Part 47
Security Architecture Patterns
Part 48
Operational Patterns and Anti-Patterns
Part 49