IT Security Defense against the digital dark arts
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.At the end of this course, you’ll understand:
● how various encryption algorithms and techniques work as well as their benefits and limitations.
● various authentication systems and types.
● the difference between authentication and authorization.
● how to evaluate potential risks and recommend ways to reduce risk.
● best practices for securing a network.
● how to help others to grasp security concepts and protect themselves.
None
Syllabus
Syllabus - What you will learn from this course
Week 1
Understanding Security Threats
Week 2
Pelcgbybtl (Cryptology)
Week 3
AAA Security (Not Roadside Assistance)
Week 4
Securing Your Networks
Week 5
Defense in Depth
Week 6
Creating a Company Culture for Security
FAQ
When will I have access to the lectures and assignments?
Access to lectures and assignments depends on your type of enrollment. If you take a course in audit mode, you will be able to see most course materials for free. To access graded assignments and to earn a Certificate, you will need to purchase the Certificate experience, during or after your audit. If you don't see the audit option:
What will I get if I subscribe to this Certificate?
When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.
Reviews
This was by far the hardest module to finish, but I did it and I especially would like to thank Coursera's support people for that. They rooted me on, and kept telling me not to give up. Thanks!
Make you relies that we may lock are car and house but we really don'y think how an intrude can take control of our lives but gaining access through poor security at our home and work spaces
Thank you to all the instructors. I learned concrete and useful IT skills from the courses and especially from the projects. After completing this course, I feel I want to learn more and more.
A more in-depth concept can be included in the course and provide a reference to open source tools/technologies so young and aspiring security professionals can gain more out of this course.