- Google Training via Coursera
- 29 hours of effort required
- 81,717+ already enrolled!
- ★★★★★ (6,784 Ratings)
There is a wide range of IT security concepts and tools that you must know. And for this purpose, this Google Digital Garage course is something that can be relied on. The course will give a brief introduction about threats and attacks and then the many ways they can show up. Similarly, you will also learn how different encryption algorithms and techniques work and what are their benefits and limitations. Moreover, you will know the difference between authentication and authorization. Then, the instructor will talk about how you can evaluate potential risks and recommend ways to reduce risks. Thus you will learn best practices for securing a network through this course.
Understanding Security Threats
Welcome to the IT Security course of the IT Support Professional Certificate! In the first week of this course, we will cover the basics of security in an IT environment. We will learn how to define and recognize security risks, vulnerabilities and threats. We’ll identify the most common security attacks in an organization and understand how security revolves around the “CIA” principle. By the end of this module, you will know the types of malicious software, network attacks, client-side attacks, and the essential security terms you’ll see in the workplace.
In the second week of this course, we’ll learn about cryptology. We’ll explore different types of encryption practices and how they work. We’ll show you the most common algorithms used in cryptography and how they’ve evolved over time. By the end of this module, you’ll understand how symmetric encryption, asymmetric encryption, and hashing work; you’ll also know how to choose the most appropriate cryptographic method for a scenario you may see in the workplace.
AAA Security (Not Roadside Assistance)
In the third week of this course, we’ll learn about the “three A’s” in cybersecurity. No matter what type of tech role you’re in, it’s important to understand how authentication, authorization, and accounting work within an organization. By the end of this module, you’ll be able to choose the most appropriate method of authentication, authorization, and level of access granted for users in an organization.
Securing Your Networks
In the fourth week of this course, we’ll learn about secure network architecture. It’s important to know how to implement security measures on a network environment, so we’ll show you some of the best practices to protect an organization’s network. We’ll learn about some of the risks of wireless networks and how to mitigate them. We’ll also cover ways to monitor network traffic and read packet captures. By the end of this module, you’ll understand how VPNs, proxies and reverse proxies work; why 802.1X is a super important for network protection; understand why WPA/WPA2 is better than WEP; and know how to use tcpdump to capture and analyze packets on a network. That’s a lot of information, but well worth it for an IT Support Specialist to understand!
- Google via Coursera
- 18 hours of effort required
- 41,894+ already enrolled!
- ★★★★★ (1,907 Ratings)
- Google Cloud via Coursera
- 40 hours of effort required
- 19,718+ already enrolled!
- ★★★★★ (4,067 Ratings)
There are no reviews yet. Be the first one to write one.