IT Security: Defense against the digital dark arts

开始时间: 12/21/2023 持续时间: 未知

所在平台: Coursera

课程主页: https://www.coursera.org/learn/it-security

课程评论:没有评论

第一个写评论        关注课程

课程详情

This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team. At the end of this course, you’ll understand: ● how various encryption algorithms and techniques work as well as their benefits and limitations. ● various authentication systems and types. ● the difference between authentication and authorization. ● how to evaluate potential risks and recommend ways to reduce risk. ● best practices for securing a network. ● how to help others to grasp security concepts and protect themselves.

课程大纲

Name:Understanding Security Threats

Description:Welcome to the IT Security course of the IT Support Professional Certificate! In the first module of this course, we will cover the basics of security in an IT environment. We will learn how to define and recognize security risks, vulnerabilities and threats. We'll identify the most common security attacks in an organization and understand how security revolves around the "CIA" principle. By the end of this module, you will know the types of malicious software, network attacks, client-side attacks, and the essential security terms you'll see in the workplace.

Name:Pelcgbybtl (Cryptology)

Description:In the second module of this course, we'll learn about cryptology. We'll explore different types of encryption practices and how they work. We'll show you the most common algorithms used in cryptography and how they've evolved over time. By the end of this module, you'll understand how symmetric encryption, asymmetric encryption, and hashing work; you'll also know how to choose the most appropriate cryptographic method for a scenario you may see in the workplace.

Name:The 3 A's of Cybersecurity: Authentication, Authorization, Accounting

Description:In the third module of this course, we'll learn about the "three A's" in cybersecurity. No matter what type of tech role you're in, it's important to understand how authentication, authorization, and accounting work within an organization. By the end of this module, you'll be able to choose the most appropriate method of authentication, authorization, and level of access granted for users in an organization.

Name:Securing Your Networks

Description:In the fourth module of this course, we'll learn about secure network architecture. It's important to know how to implement security measures on a network environment, so we'll show you some of the best practices to protect an organization's network. We'll learn about some of the risks of wireless networks and how to mitigate them. We'll also cover ways to monitor network traffic and read packet captures. By the end of this module, you'll understand how VPNs, proxies and reverse proxies work; why 802.1X is a super important for network protection; understand why WPA/WPA2 is better than WEP; and know how to use tcpdump to capture and analyze packets on a network. That's a lot of information, but well worth it for an IT Support Specialist to understand!

Name:Defense in Depth

Description:In the fifth module of this course, we're going to go more in-depth into security defense. We'll cover ways to implement methods for system hardening, application hardening, and determine the policies for OS security. By the end of this module, you'll know why it's important to disable unnecessary components of a system, learn about host-based firewalls, setup anti-malware protection, implement disk encryption, and configure software patch management and application policies.

Name:Creating a Company Culture for Security

Description:Congratulations, you've made it to the final module in the course! In the last module of this course, we'll explore ways to create a company culture for security. It's important for any tech role to determine appropriate measures to meet the three goals of security. By the end of this module, you will develop a security plan for an organization to demonstrate the skills you've learned in this course. You're almost done, keep up the great work!

Name:Prepare for Jobs in IT Support

Description:You will engage in a series of interactive activities based on concepts you’ve explored and skills you’ve gained throughout the program. You’ll also explore job readiness skills, develop your resume, and practice interviewing for jobs.

课程评论(0条)

课程简介

本课程涵盖各种 IT 安全概念、工具和最佳实践。它介绍了威胁和攻击以及它们可能出现的多种方式。我们将为您提供一些加密算法的背景知识以及它们如何用于保护数据。然后,我们将深入了解信息安全的三个方面:身份验证、授权和记帐。我们还将介绍网络安全解决方案,从防火墙到 Wifi 加密选项。本课程通过将所有这些元素组合成一个多层、深入的安全架构,然后就如何将安全文化整合到您的组织或团队中提出建议。在本课程结束时,您将了解: ● 各种加密算法和技术的工作原理以及它们的优点和局限性。 ● 各种认证系统和类型。 ● 认证与授权的区别。 ● 如何评估潜在风险并推荐降低风险的方法。 ● 保护网络的最佳实践。 ● 如何帮助他人掌握安全概念,保护自己。

课程标签

IT 安全

0人关注该课程

主题相关的课程