Connect and Protect – Networks and Network Security (Course 3) – My Reflections

Overview

In Course 3, I explored how networks are designed, how data moves across them, and the strategies used to secure both on-premises and cloud infrastructure. I learned about core protocols, common threats, and the tools and techniques that keep communications safe.

Module 1: Network Architecture

I learned how different network types—LANs, WANs, and the internet backbone—are structured and how data flows through the TCP/IP model. Mapping physical components like switches and routers helped me understand how networks support services and where security controls fit.

Module 2: Network Operations

I practiced with essential network and wireless protocols and examined how firewalls, intrusion prevention systems, and other tools maintain availability and integrity. This hands-on exploration showed me how operations teams keep traffic flowing securely and reliably.

Module 3: Secure Against Network Intrusions

I studied attack methods such as port scanning, packet sniffing, and denial-of-service, and learned how to detect and respond to them using monitoring tools. Understanding intrusion tactics sharpened my ability to investigate breaches and apply the right defensive measures.

Module 4: Security Hardening

In the final module, I focused on proactive defenses—hardening operating systems, configuring secure network architectures, and applying cloud security best practices. These techniques showed me how to reduce attack surfaces before adversaries strike.

Conclusion

Completing Course 3 gave me a solid grasp of how networks operate and how to defend them. I feel confident designing secure network segments, tuning monitoring tools, and hardening systems to withstand real-world attacks.

← Back to Portfolio