• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    Chevron Left
    Back to Computer Networks and Network Security

    Learner Reviews & Feedback for Computer Networks and Network Security by IBM

    Filled StarFilled StarFilled StarFilled StarHalf Faded Star
    4.7
    stars
    3,375 ratings

    About the Course

    The US Bureau of Labor Statistics forecasts a 32% growth in information security analyst jobs until 2032. These analysts are in demand as part
    of the team that keeps networks secure.    This course provides practical hands-on computer networking and network security experience that
    employers want. Through innovative hands-on labs, you'll learn how to secure a small home office network (SOHO), install and configure DHCP,
    and filter DNS. You’ll also get real-world practice installing and using an open-source Extended Detection and Response (XDR) system.   
    Additionally, you’ll build valuable supporting knowledge of ports, protocols, and IP addresses, including IPv6 and network routi...
    ...

    Top reviews

    MG

    Apr 25, 2020

    Filled StarFilled StarFilled StarFilled StarFilled Star

    Very solid course. Quick overview about almost everything you need to know at the beginning. A lot of useful links with additional material to study. Thanks a lot for sharing the knowledge, indeed!

    KH

    Oct 31, 2021

    Filled StarFilled StarFilled StarFilled StarFilled Star

    ​very good ..network part is little puzzle..very good course for network security and database vulnerabitities.This course gonna give you the confident you need as cyber security analyst.km hasan

    Filter by:

    1 - 25 of 688 Reviews for Computer Networks and Network Security

    Filled StarFilled StarStarStarStar

    By Marvin B

    •

    Nov 3, 2019

    The sound quality of most lectures is bad. Some lectures seem chaotic/unstructured and not very well prepared. In week three there are two videos of 8 minutes which contain only one slide, which could have been divided into more slides. Some slides have a too small script. One video seems just like an advertisement for one of IBM's software products. Although the instructors are experts in their respective field, they do not seem to have much expertise in giving lectures.

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Adhesh S H

    •

    Jun 15, 2020

    The content is basic overview of network security. I would say that the lecture videos of the first 2 weeks were just 'okay'. But the practice quizes made the content easily understandable.

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Oluwafemi M A

    •

    Jul 6, 2020

    Great course, meticulous facilitators. Thanks you all. I was once a novice in Cybersecurity but now I am well tutored to take on challenging problems and provide solution.

    Filled StarFilled StarStarStarStar

    By Maurice H

    •

    Jan 29, 2021

    There's a lot of good information in this course and I did learn a lot, however the presentation is very, very poor. The info in this course deserves a 4 star review, but the audio is absolutely terrible. Also some of the videos have extreme;y poor visuals. This course actually makes IBM look like a company with no quality assurance department.

    Filled StarFilled StarStarStarStar

    By armin m

    •

    Dec 19, 2020

    All chapters are of poor technical quality. Especial the audio quality in close to inaceptable. Some chapters are also of badly presented content. Only two are at least informative. Some refernces are not technically not usable

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Km H

    •

    Oct 31, 2021

    very good ..network part is little puzzle..very good course for network security and database vulnerabitities.This course gonna give you the confident you need as cyber security analyst.km hasan

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Hardik D

    •

    Jun 3, 2020

    I have found this course very useful to understand fundamental of Network Security. Information on Database Vulnerabilities ellobarated very effectively. This course will definatly very useful not only for IT Security developer, but also for application developer who wants to undertand how network security works and how to prevent database vulnerabilities. For additional information, Both topics are mutually exclusive and in course also there is no reference of first two weeks content in next 2 week content or vice-versa. Thanks a lot.

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By SWARIKA B

    •

    Aug 27, 2020

    This course gave me great insights into the network security domain while explaining different types of DB vulnerabilities. A quick revision of my Cyber Security and Computer Networks subjects. ;>

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Calvin B

    •

    Apr 5, 2020

    the Cybersecurity Fundamentals series course is good for the basic level only.

    We need IBM to create a more advance level course in the near future.

    Filled StarFilled StarStarStarStar

    By Jason L

    •

    Feb 7, 2021

    This section leaves a little to be desired, as the instructors on a few videos are difficult to understand due to poor recordings. Some of the subject matter presented is gone over too quickly to actually help the student understand.

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Roman D

    •

    Sep 28, 2020

    It was a little difficult to recognize the main point in "A Data Protection Solution Example, IBM Security Gaudium " section. Will be good if you do small refactoring. Dmitriy Beryoza, thank you for the great session.

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Modestas G

    •

    Apr 25, 2020

    Very solid course. Quick overview about almost everything you need to know at the beginning. A lot of useful links with additional material to study. Thanks a lot for sharing the knowledge, indeed!

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Theodore W

    •

    Aug 4, 2021

    The Course was very challenging and the same trends were observed here: Cyber professionals should understand that their student audiences have absolutely no knowledge about computers let alone cyber security. When they understand that, they would explain the key concepts more efficiently. For example, when discussing DHCP, the instructors assume the audience is just refreshing knowledge but that is not the case. The discussions on SQL Injections were also directed at audiences who were wondering on professional wisdom on cyber security practices. But this issue is present in almost all cyber related topics across companies. Please assume the students have no idea about cyber or security or cyber security. Most people hardly even know the difference between Windows and Microsoft Office.

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Alvin B

    •

    Jan 6, 2020

    The course was great I very much enjoyed it. The only problem was that in week 3 it was more demo than written side material to support the question that was asked. I had to go back and review every transcription to find supporting answers. All in all, I learn a lot more regard SIEM configuration.

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Samuel L G Z

    •

    Jul 5, 2020

    Absolutely recommended to ladies and gentleman who are currently working in network company and wanna upgrade to another POST. This Network Security and Database Vulnerabilities course are definitely the best.

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Hawra

    •

    Sep 5, 2020

    Comprehensive :) Was difficult and I'll need to come back because a lot went over my head, but overall satisfied :)

    Audio and subtitles could use some work 😅

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Alfianto P

    •

    Aug 17, 2020

    good course and help me understanding about network security, i recomend this course to anyone who wants to develop their knowledge about network security.

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Harindu P

    •

    Aug 24, 2020

    The presentation you gave was one that I will never ever forget. I can’t thank you enough for that and knowledge sharing.

    Thank you very much

    coursera

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By g z

    •

    Aug 27, 2020

    excelente curso, se aprendio bastante aunqie se que redes no es mi fuerte comprendi de la forma mas simple como funciona el modelo OSI y TCP IP

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Enock

    •

    Nov 8, 2020

    This course was very interesting and I gain a lot on this specialization. I will continue to gain the specialization of Cybersecurity Analyst.

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Jerome C

    •

    Jul 31, 2020

    IBM Courses are the absolute best on Coursera.

    Instruction is straightforward, easy to follow, and detailed.

    I recommend ALL IBM courses.

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Anita P M

    •

    Aug 30, 2020

    Most of the vulnerability assessment part is covered through this course. very good experience to learn this with some coding hints.

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Jose N N

    •

    Mar 24, 2023

    Again another excellent course from Coursera and IBM! Thank you so much!

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Francesco B

    •

    Jul 4, 2024

    Course Review: "Network Security & Database Vulnerabilities" Course Review: As an Engineering student, taking the course "Network Security & Database Vulnerabilities" was a highly enriching and valuable experience. This course delves deep into the critical aspects of securing network infrastructures and addressing vulnerabilities within databases, making it essential for anyone interested in cybersecurity or systems administration. Content and Depth: The course content was meticulously structured to cover a comprehensive range of topics. It began with foundational concepts such as network architecture and security protocols, providing a solid understanding of how data travels and the vulnerabilities it may encounter. As the course progressed, it explored advanced topics such as encryption techniques, firewall configurations, and intrusion detection systems (IDS). This progression helped in understanding both preventive measures and proactive strategies against potential cyber threats. Hands-On Learning: One of the highlights of the course was its emphasis on hands-on learning. Practical exercises and lab sessions allowed me to apply theoretical knowledge to real-world scenarios. These exercises included setting up secure networks, conducting penetration testing, and configuring databases with robust security measures. This practical approach not only reinforced the theoretical concepts but also equipped me with practical skills that are directly applicable in the field. Instructor and Support: The instructor demonstrated profound expertise in the subject matter, offering clear explanations and insightful demonstrations throughout the course. Moreover, the availability of TA support and collaborative discussions with peers further enhanced the learning experience. This supportive environment encouraged active engagement and facilitated a deeper understanding of complex topics. Relevance and Industry Applications: The course's relevance in today's digital landscape cannot be overstated. With cyber threats evolving constantly, the knowledge gained from this course is invaluable for securing organizational networks and protecting sensitive data. Understanding database vulnerabilities is particularly crucial given the increasing incidents of data breaches globally. Conclusion: In conclusion, "Network Security & Database Vulnerabilities" is a must-take course for Engineering students aspiring to specialize in cybersecurity or network administration. The comprehensive curriculum, hands-on approach, and expert instruction make it an excellent choice for gaining practical skills and knowledge in safeguarding networks and databases against potential threats. I highly recommend this course to anyone looking to build a strong foundation in network security and database protection. Overall Rating: 5/5 I highly recommend this course for its comprehensive content, practical approach, and industry relevance. It’s an excellent choice for individuals serious about entering the network security and database vulnerabilities fields or advancing their careers in this dynamic and crucial domain.

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Valère K

    •

    Jan 16, 2025

    Bien le bonjour à mes pairs, Je tiens à remercier chaleureusement les professeurs DeeDee Colette, Jeff Crume, Manish Kumar, Rav Ahuja, ainsi que toute l'équipe pédagogique d'IBM, pour les cours de la spécialisation "IBM Cybersecurity Analyst Certificate". Cette formation a été extrêmement enrichissante et m'a permis d'acquérir des connaissances solides et précieuses en matière de sécurité des actifs numériques, qui constituent une base réelle pour une carrière lumineuse dans le domaine. Je souhaite souligner la qualité des différents quiz notés et non-notés, les laboratoires pratiques, qui se sont révélés très utiles pour appliquer concrètement les notions apprises. Toutefois, je me permets de proposer une amélioration : introduire une nouvelle variation des questions et des réponses à chaque tentative. Cela rendrait l'exercice encore plus engageant et favoriserait une meilleure maîtrise des concepts. Enfin, je suggère l'ajout d'un cours de synthèse, un "Put it all together", qui permettrait de relier les différents concepts et outils enseignés. Une telle initiative offrirait une vision globale unifiée de la cybersécurité (ce que vous avez fait étant déjà assez exceptionnel) et surtout du poste en lui-même, ce qui serait particulièrement bénéfique pour les apprenants. Merci encore pour cette excellente formation et pour votre dévouement à transmettre des connaissances de grande valeur ! Valère Firmin KAMBO TAMBA

    • Chevron Left
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • ...
    • 28
    • Chevron Right

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog
    • Teaching Center

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok
    Coursera

    Sign up

    Learn on your own time from top universities and businesses.

    ​
    ​
    Between 8 and 72 characters
    Your password is hidden
    ​

    or

    Already on Coursera?


    I accept Coursera's Terms of Use and Privacy Notice. Having trouble logging in? Learner help center

    This site is protected by reCAPTCHA Enterprise and the Google Privacy Policy and Terms of Service apply.