Course

IT Security: Defense against the digital dark arts

Google

This IT Security course by Google offers a deep dive into the world of cybersecurity. Through a series of engaging modules, learners are introduced to a wide range of concepts, tools, and best practices within the field of IT security. The course begins by addressing various security threats and attacks, and then delves into the fundamentals of encryption algorithms and their applications for data protection. Learners will gain insights into the three As of information security: authentication, authorization, and accounting. Further modules explore network security solutions, including firewalls and WiFi encryption options, while also emphasizing the importance of creating a multi-layered security architecture.

The course also extends to integrating a culture of security within organizations and teams, enabling learners to understand and communicate various security concepts effectively. By the end of the course, participants will be equipped to evaluate potential risks, recommend risk reduction strategies, and implement best practices for securing networks, thereby fostering a secure environment for themselves and their organizations.

Certificate Available ✔

Get Started / More Info
IT Security: Defense against the digital dark arts
Course Modules

This course is divided into seven modules that cover understanding security threats, cryptography, the 3 A's of cybersecurity, securing networks, defense in depth, and creating a company culture for security.

Understanding Security Threats

The first module provides an overview of various security threats and attacks, including malicious software, network attacks, and denial-of-service attacks. Learners will gain a foundational understanding of the CIA Triad and essential security terms, essential for navigating the subsequent modules.

Pelcgbybtl (Cryptology)

The second module delves into the realm of cryptography, covering symmetric and asymmetric encryption algorithms, hashing, and public key infrastructure. Participants will also have the opportunity for hands-on experience with encryption and decryption techniques.

The 3 A's of Cybersecurity: Authentication, Authorization, Accounting

Module three focuses on the 3 A's of cybersecurity: authentication, authorization, and accounting. It explores best practices for authentication, multifactor authentication, access control methods, and physical privacy and security components, essential for creating a secure network environment.

Securing Your Networks

The fourth module centers on securing networks, emphasizing network hardening best practices, wireless security, network monitoring, and intrusion detection/prevention systems. Participants will also gain practical insights into network software and hardware hardening techniques.

Defense in Depth

Defense in Depth, the fifth module, introduces the concept of creating multi-layered security architectures. It covers host-based firewall, logging and auditing, antimalware protection, and software patch management, empowering learners to implement comprehensive security measures.

Creating a Company Culture for Security

Module six focuses on creating a company culture for security, addressing security goals, measuring and assessing risk, incident reporting and analysis, and privacy policies. Learners will also gain insights into user habits, incident response, and security training.

Prepare for Jobs in IT Support

The final module prepares learners for jobs in IT support. It offers guidance on various aspects of working in IT support, including common job search terms, incident handling, and creating a company culture for security.

More Security Courses

Cyber Incident Response

Infosec

Prepare for a career in Cyber Incident Response with this specialization. Gain practical skills in incident response processes and forensics to effectively address...

Introducing Security: Aligning Asset and Risk Management

(ISC)²

Introducing Security: Aligning Asset and Risk Management provides a comprehensive introduction to security concepts, asset management, and risk treatment processes....

Splunk Knowledge Manager 102

Splunk Inc.

Splunk Knowledge Manager 102 provides comprehensive training on field extractions, lookups, data models, and search optimization techniques for improved data analysis...

The Cybersecurity Culture Blueprint: A Proactive Approach

LearnQuest

The Cybersecurity Culture Blueprint: A Proactive Approach empowers professionals to foster a resilient cybersecurity culture, emphasizing the human element, training,...