CISCO Networking Academy

Master Network Defense and Cybersecurity Fundamentals

Learn how to monitor and protect your network and evaluate security alerts.

About This Course

The course is designed for aspiring cybersecurity professionals and IT enthusiasts who want to develop the skills needed for a Junior Cybersecurity Analyst role. It is ideal for beginners and entry-level IT personnel seeking practical knowledge in network monitoring, security analysis, and threat detection. You’ll learn to use tools and techniques to protect networks, including access control, firewalls, cloud security, and cryptography. The course also covers methods for analyzing security alerts and building a layered defense-in-depth strategy, equipping you to defend networks against cyberattacks and respond effectively to potential security threats.

Course Details

Level

Beginner

Mode

Self-paced

Platform

Cisco NetAcad

Cost

Free

Achievements

Course Curriculum

Module 1: Understanding Defense
  • Introduction
  • Defense-in-Depth
  • Cybersecurity Operations Management
  • Security Policies, Regulations, and Standards
  • Understanding Defense Summary
  • Introduction
  • Physical Security
  • Application Security
  • Network Hardening: Services and Protocols
  • Network Hardening: Segmentation
  • Hardening Wireless and Mobile Devices
  • Cybersecurity Resilience
  • Embedded and Specialized Systems
  • System and Network Defense Summary
  • Introduction
  • Access Controls
  • Access Control Concepts
  • Account Management
  • AAA usage and operation
  • Access Control Summary
  • Introduction
  • Introduction to Access Control Lists
  • Wildcard Masking
  • Configure ACLs
  • Named Standard IPv4 ACL Syntax
  • Implement ACLs
  • Mitigate Attacks with ACLs
  • IPv6 ACLs
  • Access Control Lists Summary
  • Introduction
  • Secure Networks with Firewalls
  • Firewalls in Network Design
  • Firewall Technologies Summary
  • Introduction
  • ZPF Overview
  • ZPF Operation
  • Configure a ZPF
  • Zone-Based Firewalls Summary
  • Introduction 
  •  Cloud Security Summary
  •  Protecting VMs
  •  Cloud Data Security
  • Cloud Application Security
  • Cloud Infrastructure Security
  • The Domains of Cloud Security
  • Virtualization and Cloud Computing
  • Introduction
  • Confidentiality
  • Obscuring Data
  •  Integrity and Authenticity
  • Using Hashes
  • Public Key Cryptography
  • Authorities and the PKI Trust System
  • Applications and Impacts of Cryptography
  • Cryptography Summary
  • Introduction
  • Monitoring Common Protocols
  • Security Technologies
  • Technologies and Protocols Summary
  • Types of Security Data
  • End Device Logs
  • Network Logs
  • Network Security Data Summary
  • Introduction
  • Sources of Alerts
  • Overview of Alert Evaluation
  • Evaluating Alerts Summary

Enrollment Steps

Step 1: Enrollment
Fill out the Enrollment Form to get started.
Step 2: Confirmation Email

Check your inbox for the course access link and instructions.

Step 3:Access Course

Click the link to log in to Cisco NetAcad and start learning.

Step 4: Complete Modules

Watch video lessons, perform hands-on exercises, and explore PC components.

Step 5: Assess Knowledge

Take quizzes and practice labs to reinforce your learning.

Step 6: Earn Digital Badge

Complete the course and receive your digital badge to showcase your achievement.

Start Your Network Defense Journey

 




    Frequently Asked Questions

    How do I enroll in the course?
    Click the “Enrollment Steps” button, follow the instructions, and submit the enrollment form. You’ll receive a confirmation email with the course link.
    No. These courses are beginner-friendly. You can start with no prior knowledge and build your skills step by step.
    Some courses provide digital badges, while others may offer certificates. Check the course page for the specific reward.
    After enrollment, you’ll receive an email with a link to the Cisco NetAcad platform. Log in to access lessons, labs, and quizzes.
    If you have technical or enrollment issues, contact our support team through the email or WhatsApp.