This course was ranked in the Top 100 Best Courses on Coursera, based on its high ratings and large number of ratings.
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can appear. We'll give you some background on encryption algorithms and how they're used to protect data. Then, we'll dive into the three A's of information security: authentication, authorization, and accounting. We will also cover network security solutions, ranging from firewalls to Wi-Fi encryption options. The course is completed by putting all the
This course covers a wide variety of IT security concepts, tools, and best practices.
It introduces threats and attacks and the many ways they can appear.
We'll give you some background on encryption algorithms and how they're used to protect data.
Then, we'll dive into the three A's of information security: authentication, authorization, and accounting.
We will also cover network security solutions, ranging from firewalls to Wi-Fi encryption options.
The course is rounded off by bringing all of these elements together into an in-depth, multi-layered security architecture, followed by recommendations on how to embed a culture of security in your organization or team.
At the end of this course, you will understand: ● how different encryption algorithms and techniques work, and their advantages and limitations.
● various types and systems of authentication.
● the difference between authentication and authorization.
● how to assess potential risks and recommend ways to reduce them.
● best practices for protecting a network.
● how to help others understand security concepts and protect themselves.
50
Welcome to the IT Support Professional Certificate IT Security course! In the first week of this course, we will cover the basics of security in an IT environment. We will learn to define and recognize risks, vulnerabilities and security threats. We will identify the most common security attacks in an organization and understand how security revolves around the "CIA" principle. By the end of this module, you'll learn about the types of malware, network attacks, client-side attacks, and essential security terms you'll see in the workplace.
In the second week of this course, we will learn about cryptology. We will explore different types of encryption practices and how they work. We will show you the most common algorithms used in cryptography and how they have evolved over time. By the end of this module, you will understand how symmetric encryption, asymmetric encryption, and hashing work; You will also know how to choose the most appropriate crypto method for a scenario you may see in the workplace.
In the third week of this course, we will learn about the "three A's" in cybersecurity. Regardless of the type of technology function you perform, it is important to understand how authentication, authorization, and accounting work within an organization. By the end of this module, you will be able to choose the most appropriate authentication method, authorization, and access level for users in an organization.
In the fourth week of this course, we will learn about secure network architecture. It's important to know how to implement security measures in a network environment, so we'll show you some of the best practices for protecting an organization's network. We will learn about some of the risks of wireless networks and how to mitigate them. We will also cover ways to monitor network traffic and read packet captures. By the end of this module, you will understand how VPNs, proxies, and reverse proxies work; why 3X is so important for network protection; understand why WPA/WPA3 is better than WEP; and know how to use tcpdump to capture and analyze packets on a network. That's a lot of information, but one worth understanding by an IT support specialist.
In the fifth week of this course, we're going to dive deeper into security advocacy. We will cover ways to implement methods for system hardening, application hardening, and determining policies for operating system security. By the end of this module, you will know why it is important to disable unnecessary components of a system, learn about host-based firewalls, configure anti-malware protection, implement disk encryption, and configure software patch management and security settings. application policies.
Prepare yourself from home with the most prestigious universities in the world.
The quality of Coursera's courses is supported by its instructors, who are often deans and have doctorates.
More than 85% of Coursera students report career benefits, such as promotions or salary increases.
Millions of students around the world are meeting their personal and professional goals with Coursera.
Coursera offers courses from over 200 leading universities and companies to deliver online learning around the world. With a Coursera Plus subscription, you get unlimited access to over 90% of all courses, and the most popular professional certificates and specializations on Coursera.
Data science, business and personal development. You can enroll in multiple courses at once, earn unlimited certificates, and learn in-demand job skills to start, grow, and even change careers.
DISCOVER HOW TO GET THE MOST, AND SAVE OVER USD $500 WITH AN ANNUAL SUBSCRIPTION TO COURSERA PLUS*
*You save up to USD$500 in 12 months, when you go from paying USD$59 for a monthly subscription, to an annual subscription with the promotion. The normal annual subscription is USD $399. With the promotion you will only pay USD $299. Find out everything by clicking the yellow button.
my person_add 1.617.717 students
my computer49 courses
Google Career Certificates are part of Grow with Google, an initiative that builds on Google's 20-year history of creating products, platforms, and services that help people and businesses grow. Through programs like these, our goal is to help everyone—those in today's workforce and the students who will power tomorrow's workforce—access the best of Google's training and tools to build their skills. skills, careers and businesses.
Hello how can I help you? Are you interested in a course? About what subject?
Add a review