When you enroll through our links, we may earn a small commission—at no extra cost to you. This helps keep our platform free and inspires us to add more value.

Illinois Tech logo

Introduction to Data Networks and the Internet - Master's

Master the Skills of Tomorrow with Coursera! From AI and Blockchain to Public Speaking and Psychology, Explore Courses Tailored for Your Success.

     0 |
  • Reviews ( 0 )
Free

This Course Includes

  • iconcoursera
  • icon0 (0 reviews )
  • iconFlexible schedule
  • iconenglish
  • iconOnline - Self Paced
  • iconcourse
  • iconIllinois Tech

About Introduction to Data Networks and the Internet - Master's

This course covers current and evolving data network technologies, protocols, network components, and the networks that use them, focusing on communication to and from the Internet and Local area networks. Course content includes Internet architecture, organization, and protocols including Ethernet, 802.11, routing, switching, OSI and TCP models, DNS, SNMP, DHCP, and more. Students will be presented with Internet-specific networking tools for searching, testing, debugging, and configuring networks and network-connected host computers. At the graduate level, students will be given real-world examples, with best practice and business use cases as related to the content on hand, as well as threats and mitigation steps. Upon successful completion of this course, you will be able to: - Introduce communication fundamentals as they relate to popular communication models such as the TCP and OSI models. - Provide an understanding of the distributed nature of the internet. - Discuss the requirements for communication between local area networks and internet. - Identify and define protocols needed for LAN and WAN communication. - Learn the basics of analyzing, inspecting, and monitoring network traffic. - Become aware of threats to networks and networked devices. - Utilize tools for doing basic network reconnaissance.

What You Will Learn?

  • Learners will be given real-world examples, with best practices and business use cases related to the content on hand.Network-related security threats as well as mitigation steps will be discussed to give insight on how communications mediums can be exploited.The use of several network reconnaissance and communication analyzer tools will be used to examine network traffic..