Chevron Left
Back to Computer Networks and Network Security

Learner Reviews & Feedback for Computer Networks and Network Security by IBM

4.7
stars
3,134 ratings

About the Course

The US Bureau of Labor Statistics forecasts a 32% growth in information security analyst jobs until 2032. These analysts are in demand as part of the team that keeps networks secure.    This course provides practical hands-on computer networking and network security experience that employers want. Through innovative hands-on labs, you'll learn how to secure a small home office network (SOHO), install and configure DHCP, and filter DNS. You’ll also get real-world practice installing and using an open-source Extended Detection and Response (XDR) system.    Additionally, you’ll build valuable supporting knowledge of ports, protocols, and IP addresses, including IPv6 and network routing. You’ll learn about Layer 2 and 3 addressing, routers, and routing tables.   Plus, you’ll develop knowledge of cybersecurity analyst tools for data protection, endpoint protection, and SIEM, which you can apply to an organization’s compliance and threat intelligence needs, which is crucial in today’s cybersecurity landscape.  You’ll complete a final project where you will demonstrate your ability to perform network and security planning tasks.  Networking and network security skills pay. Invest in yourself and enroll today! ...

Top reviews

AB

Invalid date

A wonderful and nicely structured course for a beginner. Audio quality isn't matching the standard of other courses offered in coursera which should be improved in near future.

LL

Invalid date

This course will give you a indepth knowledge on network protocols, addressing layers and Databse vulnerabilities in MySQL and many more. This is an excellent course.

Filter by:

551 - 575 of 632 Reviews for Computer Networks and Network Security

By Syed M A J

Oct 6, 2022

Superb Course!!!

By Gonzalo D C M

Dec 1, 2020

Excelente curso

By Abdikhan A

Jul 23, 2024

хорошая работа

By A.M I H A

Dec 1, 2020

Great course.

By Sudhanshu R

Apr 25, 2020

good learning

By Andre C

Oct 12, 2019

learned a lot

By Bourama S

Jun 21, 2022

informative

By Rahul G M

Feb 5, 2022

Good course

By JOSEPH K R

Jun 24, 2020

Good Course

By Jussef A M

Sep 13, 2022

excelent

By Daniel A

Oct 28, 2020

very good

By Thisenthira N

Jul 28, 2020

Thank you

By Sukumar E

Nov 12, 2021

Helpful

By Aboagye A B

Sep 22, 2020

Awesome

By Dr. A K S

Jul 14, 2022

great

By BR W

Oct 8, 2023

great

By Sunil S

Oct 18, 2020

Good.

By ANURAG S S - B

Jul 13, 2020

best!

By Awais M

Apr 9, 2023

Nill

By Charbel Y

May 9, 2021

Good

By JOE M S

Aug 14, 2020

good

By HASAN, M T

Jun 11, 2020

good

By Dhruv R G

May 8, 2020

nice

By Theresa S

Aug 10, 2022

I really like the course being split up into short video clips of not more than 10min. The transcripts provided are really helpful too. There are some areas of improvement:

1. Sound quality needs improving - while the sound quality is good in most of the videos, videos of the whole topic on Data Source Types are not good at all. The transcripts is not quite correct (perhaps due to the unclear sound recording) , which cannot deliver the content of the topic as clearly.

2. "Key Take Away" - this is very important for all topics as it summarises the key points of the topic. I really like the "key take aways" mentioned in the Deep Dive. Hope this can be added to other topics too.

I found all topics covered under Network Security and Deep Dive are very clear and professionally produced. The Data Source Types on the other hand is not as proffessionally done as others.

Thank you for taking the time to read my feedback. :)

By Jonathan V C

Apr 1, 2021

The only course (first two weeks only) in all the certification that was helpful, to polish my networks knowledge only, not for the security part. At the end this course is a summary of basic networking, and a "just buy some cool IBM products that do everything for you". The second part of databases is some random information about databases and obvious information of why you need to secure it.