IT Security: Defense against the digital dark arts

  • 4.8
Approx. 30 hours to complete

Course Summary

This course covers the basics of IT security, including cryptography, network security, and security management. Students will learn how to identify and mitigate security threats, as well as develop strategies to protect against future attacks.

Key Learning Points

  • Learn the fundamentals of IT security
  • Develop strategies to protect against security threats
  • Identify and mitigate security risks

Related Topics for further study


Learning Outcomes

  • Understand the basics of IT security
  • Develop strategies to protect against security threats
  • Identify and mitigate security risks

Prerequisites or good to have knowledge before taking this course

  • Basic knowledge of computer systems
  • Familiarity with networking concepts

Course Difficulty Level

Intermediate

Course Format

  • Online
  • Self-paced

Similar Courses

  • Cybersecurity Essentials
  • Network Security
  • Introduction to Cryptography

Related Education Paths


Notable People in This Field

  • Bruce Schneier
  • Mikko Hypponen

Related Books

Description

This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.

Outline

  • Understanding Security Threats
  • Course Introduction
  • The CIA Triad
  • Essential Security Terms
  • Malicious Software
  • Malware Continued
  • Network Attacks
  • Denial-of-Service
  • Client-Side Attacks
  • Password Attacks
  • Deceptive Attacks
  • Navigating Coursera
  • Program Surveys
  • How to Use Discussion Forums
  • Get to Know Your Classmates
  • Supplemental Reading for Malicious Software
  • Supplemental Reading for Network Attacks
  • Supplemental Reading for DDoS Attacks
  • Malicious Software
  • Network Attacks
  • Other Attacks
  • Understanding Security Threats
  • Pelcgbybtl (Cryptology)
  • Cryptography
  • Symmetric Cryptography
  • Symmetric Encryption Algorithms
  • Rob What a Security Engineer Does
  • Asymmetric Cryptography
  • Asymmetric Encryption Algorithms
  • Hashing
  • Hashing Algorithms
  • Hashing Algorithms (continued)
  • Public Key Infrastructure
  • Cryptography in Action
  • Securing Network Traffic
  • Cryptographic Hardware
  • Rejection
  • Supplemental Reading for The Future of Cryptanalysis
  • Supplemental Reading for Symmetric Encryptions
  • Supplemental Reading for Asymmetric Encryption Attack
  • Supplemental Reading for SHA1 Attacks
  • Supplemental Reading for the X.509 Standard
  • Supplemental Reading for PGP
  • Supplemental Reading for Securing Network Traffic
  • Supplemental Reading for TPM Attacks
  • Instructions for Accessing Linux and Windows Qwiklabs
  • Symmetric Encryption
  • Public Key or Asymmetric Encryption
  • Hashing
  • Cryptography Applications
  • Week Two Practice Quiz
  • AAA Security (Not Roadside Assistance)
  • Authentication Best Practices
  • Multifactor Authentication
  • Certificates
  • LDAP
  • RADIUS
  • Kerberos
  • TACACS+
  • Single Sign-On
  • Rob Path to IT
  • Authorization and Access Control Methods
  • Access Control
  • Access Control List
  • Tracking Usage and Access
  • Rob Important Skills in Security
  • Supplemental Reading for Authentication
  • Supplemental Reading for Authorization
  • Authentication
  • Authorization and Accounting
  • AAA Security (Not Roadside Assistance)
  • Securing Your Networks
  • Network Hardening Best Practices
  • Network Hardware Hardening
  • Network Software Hardening
  • Joe Personal Obstacle
  • WEP Encryption and Why You Shouldn't Use It
  • Let's Get Rid of WEP! WPA/WPA2
  • Wireless Hardening
  • Heather Social Engineering
  • Sniffing the Network
  • Wireshark and tcpdump
  • Intrusion Detection/Prevention Systems
  • Supplemental Reading for Network Hardening Best Practices
  • Supplemental Reading on IEEE 802.1X
  • Supplementary reading on HAProxy, nginx and Apache HTTP server
  • Supplementary reading for WEP Encryption and Why You Shouldn't Use It
  • Supplementary reading on WiFi Protected Setup (WPS) PIN brute force vulnerability
  • Supplemental Reading for Promiscuous Mode
  • Supplemental reading for Intrusion Detection/Prevention System
  • Secure Network Architecture
  • Wireless Security
  • Network Monitoring
  • Week Four Practice Quiz
  • Defense in Depth
  • Intro to Defense in Depth
  • Disabling Unnecessary Components
  • Host-Based Firewall
  • Logging and Auditing
  • Antimalware Protection
  • Disk Encryption
  • Heather Self Learning
  • Software Patch Management
  • Application Policies
  • Supplemental Reading for Logging and Auditing
  • Supplemental Readings for Antimalware Protection
  • Supplemental Reading for Disk Ecryption
  • System Hardening
  • Application Hardening
  • Defense in Depth
  • Creating a Company Culture for Security
  • Security Goals
  • Measuring and Assessing Risk
  • Privacy Policy
  • User Habits
  • Third-Party Security
  • Security Training
  • Alex Grit Story
  • Incident Reporting and Analysis
  • Incident Response and Recovery
  • Mobile Security and Privacy
  • Amir Interview
  • Ari Interview
  • Interview Role Play: Security
  • Final Assessment
  • Framing yourself
  • Congratulations!
  • Supplemental Reading for Risk in the Workplace
  • Supplemental Reading for User Habits
  • Supplemental Reading for Vendor Security Assessment Questionnaires
  • Supplemental Readings for Mobile Security and Privacy
  • Invitation to Sign Up for Big Interview
  • Final Project - Sample Submission
  • How to Add Google IT Support Certificate to Your Resume and LinkedIn Profile
  • Common Job Search Terms
  • Information and FAQs about badges
  • Risk in the Workplace
  • Users
  • Incident Handling
  • Creating a Company Culture for Security
  • Creating a Company Culture for Security - Design Document
  • Your Access to Google Job Search Resources

Summary of User Reviews

Read reviews about the IT Security course on Coursera. Learners have given positive feedback about the comprehensive curriculum and engaging instructors. The course has received an overall high rating based on user feedback.

Key Aspect Users Liked About This Course

Many users found the course to be very informative and practical, providing them with the necessary skills to protect their digital assets and understand the latest cybersecurity threats.

Pros from User Reviews

  • Comprehensive curriculum covering a wide range of topics in IT security
  • Engaging instructors with real-world experience in the field
  • Hands-on assignments and projects that reinforce the concepts learned in the course
  • Flexible learning options with self-paced modules and quizzes
  • Access to a supportive community of learners and professionals in the field

Cons from User Reviews

  • Some users found the course to be too technical and challenging for beginners
  • Limited interaction with instructors and other learners
  • Course materials and lectures could be more engaging and interactive
  • The course may not provide enough practical experience for those seeking advanced cybersecurity skills
  • The course may not be suitable for those looking for a quick and easy overview of IT security concepts
English
Available now
Approx. 30 hours to complete
Google Career Certificates Top Instructor
Google
Coursera
Share
Saved Course list
Cancel
Get Course Update
Computer Courses