starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
  1. Courses
  2. >
  3. Network Defense Strategies

Network Defense Strategies

In this course, you’ll learn how to design, implement, and manage secure network infrastructures that can withstand evolving cyber threats.

Ahmed  Elhenedy
Ahmed Elhenedy
Networking | intermediate | 8 hours 15 minutes |   Published: Oct 2025

    Discussions

Overview

1KSTUDENTS*
97.8%RECOMMEND*
  • On-demand videos
  • Practice assessments
  • Multiple hands-on learning activities
  • Exposure to a real-world project
  • 100% self-paced learning opportunities
  • Certification of completion

In a world increasingly reliant on digital infrastructure, the security of network has become a corner stone of organizational resilience, as network continue to grow in complexity and interconnectivity across offices, production plants and data centres, the threat landscape continue to evolve, cyber adversaries no longer rely on brute force attack alone; they exploit architectural weakness, misconfiguration and unmonitored systems to defend against such threats organizations must design, implement and manage networks with security woven into every layer    

This course provides students with an in-depth, structured, and practical understanding of how to secure modern network environments through every phase of their lifecycle. It is specifically designed to help learners develop the skills to build secure, scalable networks; deploy key protective technologies such as VLANs and VPNs; monitor traffic in real-time; and establish effective network defence strategies. Emphasizing a blend of architecture, hands-on configuration, and policy-driven operations, this course is ideal for aspiring network security professionals, system administrators, or anyone responsible for protecting organizational infrastructure. 

Skills You Will Gain

Network Security
Cyber Security
VLAN Configuration
VPN Tunnelling
Traffic Monitoring

Learning Outcomes (At The End Of This Program, You Will Be Able To...)

  • Apply secure design using threat modeling, VLANs, subnetting, and layered zones to control traffic and reduce enterprise risk. 
  • Implement ACLs and VPNs to regulate traffic by IP, protocol, port, and encrypt data across public/private networks. 
  • Configure AAA with TACACS+ to manage admin access and monitor network activity for threat detection and response. 
  • Apply advanced techniques to design and validate a secured enterprise network using integrated prior skills.

Prerequisites

To fully benefit from this course, learners should have a foundational grasp of networking concepts, including how data moves through a network and how routing and switching function. Familiarity with IP addressing, subnetting, and basic routing/switching protocols will help participants engage more effectively with the practical labs and configuration exercises presented throughout the program.

Who Should Attend

This course is tailored for network engineers, administrators, and cybersecurity professionals who play a key role in safeguarding organizational infrastructure. It is equally valuable for IT practitioners seeking to enhance their understanding of network defense mechanisms, as well as learners preparing for careers in network or systems security. The course bridges theoretical concepts with hands-on implementation, ensuring participants can design and operate secure networks in real-world environments.

Curriculum

Instructors

*Where courses have been offered multiple times, the “# Students” includes all students who have enrolled. The “%Recommended” shown is also based on this data.
1Chapter 1: Introduction
2Chapter 2: Understanding Network Security Basics
3Chapter 3: Designing Secure Network Architectures
4Chapter 4: Implementing VLANs in Real Network
5Chapter 5: Controlling Access with ACLs
6Chapter 6: VPNs and Securing Traffic in Transit
7Chapter 7: Securing Network Devices Locally
8Chapter 8: AAA and TACACS+ Integration
9Chapter 9: Monitoring Network Traffic and Performance
10Chapter 10: Building a Layered Defense Strategy
11Chapter 11: Wireless Network Security Fundamentals
12Chapter 12: Wireless Monitoring and Intrusion Prevention
13Chapter 13: Capstone-Building a Secure Network

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 00: Reading - Welcome to the Course

Segment 01: Intro Video to Course

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 02: Chapter Introduction

Segment 03: What is Network Security and Why It Matters

Segment 04: Common Threats and Attack Vectors

Segment 05: The CIA Triad and Security Design Principles

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 06: Security Zones and Segmentation

Segment 07: The Role of Subnetting and Addressing in Security

Segment 08: Introduction to VLANs and Network Isolation

Ahmed  Elhenedy

Ahmed Elhenedy

As an experienced network engineer, Ahmed has dedicated over seven years to mastering the intricacies of network design, implementation, and troubleshooting. His journey has taken him through a range of roles, supporting both local and global clients, and honing his expertise across LAN, SD-WAN, and WLAN technologies. Through this, he has developed a hands-on, comprehensive understanding of network architecture and its impact on business resilience and productivity. His focus has always been on deploying efficient and reliable solutions that are resilient and scalable, meeting the specific needs of the environments he serves.

One of the aspects Ahmed is most passionate about is working on migration projects and managing high-level incident cases. This experience has given him the depth to address and resolve complex technical challenges as a 3rd-level expert. Whether supporting multinational teams or local businesses, he approaches each case with a keen focus on collaboration and precision, ensuring that all systems run smoothly. His experience across incident management has also taught him the importance of speed and accuracy, especially in critical situations where network stability directly impacts an organization’s operations.

Teaching has become a natural extension of Ahmed’s career in network engineering. As an instructor, he shares his experiences, best practices, and insights with students eager to dive into this dynamic field. He strives to make complex concepts clear and applicable, equipping learners to navigate the evolving landscape of networking with confidence and technical proficiency. Ahmed is excited to contribute to their professional growth and inspire the next generation of network professionals.

VIEW MY CHANNEL

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 09: Demo: VLAN Configuration on Switches

Segment 10: Demo: Inter-VLAN Routing and Trunking

Segment 11: VLAN Hopping Attacks and Mitigations

Segment 12: Reading - VLAN Best Practices and Security Tips for Cisco Business Routers

Segment 13: Hands-On-Learning - Creating VLANs and Implementing Inter-VLAN Routing

Segment 14: Quiz - Network Security Fundamentals & Architecture

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 15: Chapter Introduction

Segment 16: What Are ACLs and Why They Matter

Segment 17: Standard vs. Extended ACLs

Segment 18: Applying ACLs to Interfaces and Traffic Flows

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 22: Demo: Creating User Accounts and Privilege Levels

Segment 23: Demo: Password Policies and Local Authentication

Segment 24: Securing Management Access with SSH and Console Restrictions

Segment 25: Reading - Cisco IOS XE Software Hardening Guide

Segment 26: Hands-On-Learning - Configuring and Applying Access Control Lists (ACLs)

Segment 27: Quiz - Access Control, VPNs, and Device Security

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 19: VPN Fundamentals and Encryption Concepts

Segment 20: Demo: Site-to-Site vs. Remote-Access VPNs

Segment 21: VPN Protocols: IPSec, SSL, and L2TP

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 28: Chapter Introduction

Segment 29: Understanding AAA: Authentication, Authorization, Accounting

Segment 30: Demo: TACACS+ vs. RADIUS: What’s the Difference

Segment 31: Configuring TACACS+ on Network Devices

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 32: Tools for Monitoring: Wireshark, NetFlow, and SNMP

Segment 33: Packet Analysis and Intrusion Detection Basics

Segment 34: Using Logs and Alerts to Detect Threats

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 41: Chapter Introduction

Segment 42: Wireless Threats: Rogue APs, Eavesdropping, MITM

Segment 43: WPA2 vs. WPA3 and Secure Authentication

Segment 44: Segmenting Wireless Traffic with VLANs and ACLs

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 45: Detecting Rogue Access Points

Segment 46: Demo: Wireless IDS/IPS and Monitoring Tools

Segment 47: Best Practices for Enterprise Wi-Fi Security

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 48: Demo: Planning a Secure Network from the Ground Up

Segment 49: Demo: Implementing VLANs, VPNs, and Access Controls

Segment 50: Final Review: Auditing and Defending the Full Environment

Segment 51: Reading - Top Wireless Network Security Best Practices

Segment 52: Hands-On-Learning - Segmenting Wireless Traffic with VLANs and ACLs

Segment 53: Quiz - Wireless Security, Operations & Final Project

Segment 54: Course Wrap-up Video

Segment 55: Project - Designing and Defending a Complete Enterprise Network

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 35: Defense in Depth: Combining Controls

Segment 36: Firewalls, IDS/IPS, and Honeypots

Segment 37: Threat Response and Containment Techniques

Segment 38: Reading - AAA, TACACS+, and SSH: Secure Access Control Explained

Segment 39: Hands-On-Learning - Configuring TACACS+ for Centralized Authentication

Segment 40: Quiz - Centralized Authentication and Network Monitoring