The benefit of learning together with your friend is that you keep each other accountable and have meaningful discussions about what you're learning.

Courtlyn
Promotion and Events SpecialistDevelop superior standards in enterprise network security
Download BrochureJanuary 4, 2024
6 weeks, online
4–6 hours per week
Our participants tell us that taking this program together with their colleagues helps to share common language and accelerate impact.
We hope you find the same. Special pricing is available for groups.
The benefit of learning together with your friend is that you keep each other accountable and have meaningful discussions about what you're learning.
Courtlyn
Promotion and Events SpecialistWhile enterprise connectivity has advanced the way we work, cyber threats have emerged as a top business concern—and network security has become an absolute necessity. What are the implications? With the network security market poised to explode, demand for cybersecurity and technology professionals with foundational knowledge of networks—and how to keep them safe—has risen exponentially.
The Network Security program from NYU Tandon School of Engineering was designed to round out your portfolio of cybersecurity knowledge with an essential understanding of how to secure your organization’s data, applications, and devices—and help you stand out as a valued member of your organization’s information security team.
Value of the global network security market by 2029
Information security analyst took the top spot for the best jobs in America in 2022
New job growth for information security analysts by 2030
Throughout this six-week program, you will take your knowledge of network security to the next level by strengthening your network fundamentals, learning how to leverage monitoring and auditing, diving deep into security practices for emerging technologies, and understanding how to weave critical security enterprise into the fabric of your organization.
Understanding networks is critical to securing them. Learn your way around the basics to ensure your organization has the most advanced cybersecurity plan in place.
Networks are vulnerable to a wide range of attacks. Discover the different types of attacks and how they are carried out.
Security architecture protects your organization’s network components. Learn about the architectures you will most commonly find on an enterprise network, and understand how communications are kept secure.
Explore how network monitoring and auditing can be used to detect intrusions.
Dive deeper into the security practices for wireless and cloud networks. Then, learn about advancements in Wi-Fi security standards.
Understand how to create organizational structure and policies conducive to implementing network security practices for your business.
Understanding networks is critical to securing them. Learn your way around the basics to ensure your organization has the most advanced cybersecurity plan in place.
Explore how network monitoring and auditing can be used to detect intrusions.
Networks are vulnerable to a wide range of attacks. Discover the different types of attacks and how they are carried out.
Dive deeper into the security practices for wireless and cloud networks. Then, learn about advancements in Wi-Fi security standards.
Security architecture protects your organization’s network components. Learn about the architectures you will most commonly find on an enterprise network, and understand how communications are kept secure.
Understand how to create organizational structure and policies conducive to implementing network security practices for your business.
Examine network vulnerabilities, and learn how to manage them by exploring tools and frameworks such as Nmap, Burp Suite, and OWASP.
Discover powerful information logging and analysis tools, such as SIEM, the MITRE ATT&CK framework, and the Pyramid of Pain.
Put your knowledge into practice by providing secure design guidance and recommendations for a startup company’s new network.
Video lectures
Try-it activities
Peer discussions
Real-world tools & technologies
Capstone project
Guest insights
Cohort-based learning
This program is designed for early to mid-level cybersecurity and IT/technology professionals in any industry who wish to advance their career in cybersecurity and its applications, preparing them to react to today’s threats, anticipate the risks of tomorrow, and protect the future of their organization.
The curriculum will provide a distinct advantage for:
Prerequisites
Participants will have the opportunity to work with a variety of frameworks and tools throughout the program; however, no prior experience is required.
Upon successful completion of the program, participants will be awarded a verified digital certificate by NYU Tandon.
Download Brochure
After reviewing the information on the program landing page, we recommend you submit the short form above to gain access to the program brochure, which includes more in-depth information. If you still have questions on whether this program is a good fit for you, please email learner.success@emeritus.org, and a dedicated program advisor will follow-up with you very shortly.
Some programs do have prerequisites, particularly the more technical ones. This information will be noted on the program landing page, as well as in the program brochure. If you are uncertain about program prerequisites and your capabilities, please email us at the ID mentioned above.
Note that, unless otherwise stated on the program web page, all programs are taught in English and proficiency in English is required.
More than 50 percent of our participants are from outside the United States. Class profiles vary from one cohort to the next, but, generally, our online certificates draw a highly diverse audience in terms of professional experience, industry, and geography — leading to a very rich peer learning and networking experience.
Check back to this program web page or email us to inquire if future program dates or the timeline for future offerings have been confirmed yet.
Each program includes an estimated learner effort per week. This is referenced at the top of the program landing page under the Duration section, as well as in the program brochure, which you can obtain by submitting the short form at the top of this web page.
We have designed this program to fit into your current working life as efficiently as possible. Time will be spent among a variety of activities including:
The program is designed to be highly interactive while also allowing time for self-reflection and to demonstrate an understanding of the core topics through various active learning exercises. Please email us if you need further clarification on program activities.
More than 300,000 learners across 200 countries have chosen to advance their skills with Emeritus and its educational learning partners. In fact, 90 percent of the respondents of a recent survey across all our programs said that their learning outcomes were met or exceeded.
All the contents of the course would be made available to students at the commencement of the course. However, to ensure the program delivers the desired learning outcomes the students may appoint Emeritus to manage the delivery of the program in a cohort-based manner the cost of which is already included in the overall course fee of the course.
A dedicated program support team is available 24/5 (Monday to Friday) to answer questions about the learning platform, technical issues, or anything else that may affect your learning experience.
Peer learning adds substantially to the overall learning experience and is an important part of the program. You can connect and communicate with other participants through our learning platform.
Each program includes an estimated learner effort per week, so you can gauge what will be required before you enroll. This is referenced at the top of the program landing page under the Duration section, as well as in the program brochure, which you can obtain by submitting the short form at the top of this web page. All programs are designed to fit into your working life.
This program is scored as a pass or no-pass; participants must complete the required activities to pass and obtain the certificate of completion. Some programs include a final project submission or other assignments to obtain passing status. This information will be noted in the program brochure. Please email us if you need further clarification on any specific program requirements.
Upon successful completion of the program, you will receive a smart digital certificate. The smart digital certificate can be shared with friends, family, schools, or potential employers. You can use it on your cover letter, resume, and/or display it on your LinkedIn profile.
The digital certificate will be sent approximately two weeks after the program, once grading is complete.
No, only verified digital certificates will be issued upon successful completion. This allows you to share your credentials on social platforms such as LinkedIn, Facebook, and Twitter.
No, there is no alumni status granted for this program. In some cases, there are credits that count toward a higher level of certification. This information will be clearly noted in the program brochure.
You will have access to the online learning platform and all the videos and program materials for 12 months following the program start date. Access to the learning platform is restricted to registered participants per the terms of agreement.
Participants will need the latest version of their preferred browser to access the learning platform. In addition, Microsoft Office and a PDF viewer are required to access documents, spreadsheets, presentations, PDF files, and transcripts.
Yes, the learning platform is accessed via the internet, and video content is not available for download. However, you can download files of video transcripts, assignment templates, readings, etc. For maximum flexibility, you can access program content from a desktop, laptop, tablet, or mobile device.
Video lectures must be streamed via the internet, and any livestream webinars and office hours will require an internet connection. However, these sessions are always recorded, so you may view them later.
Yes, you can register up until seven days past the published start date of the program without missing any of the core program material or learnings.
The program fee is noted at the top of this program web page and usually referenced in the program brochure as well.
Yes, you can do the bank remittance in the program currency via wire transfer or debit card. Please contact your program advisor, or email us for details.
Yes! Please email us with the details of the program you are interested in, and we will assist you.
Please email us your invoicing requirements and the specific program you’re interested in enrolling in.
Yes, the flexible payment option allows a participant to pay the program fee in installments. This option is made available on the payment page and should be selected before submitting the payment.
Please connect with us via email for assistance.
You may request a full refund within seven days of your payment or 14 days after the published start date of the program, whichever comes later. If your enrollment had previously been deferred, you will not be entitled to a refund. Partial (or pro-rated) refunds are not offered. All withdrawal and refund requests should be sent to admissions@emeritus.org.
After the published start date of the program, you have until the midpoint of the program to request to defer to a future cohort of the same program. A deferral request must be submitted along with a specified reason and explanation. Cohort changes may be made only once per enrollment and are subject to availability of other cohorts scheduled at our discretion. This will not be applicable for deferrals within the refund period, and the limit of one deferral per enrollment remains. All deferral requests should be sent to admissions@emeritus.org.