IT Security: Defense against the digital dark arts Free Download

GET IT Security: Defense against the digital dark arts Free Download

This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.

At the end of this course, you’ll understand:
● how various encryption algorithms and techniques work as well as their benefits and limitations.
● various authentication systems and types.
● the difference between authentication and authorization.
● how to evaluate potential risks and recommend ways to reduce risk.
● best practices for securing a network.
● how to help others to grasp security concepts and protect themselves.

SKILLS YOU WILL GAIN

  • Cybersecurity
  • Wireless Security
  • Cryptography
  • Network Security

What you will learn from this course

Week 1: Understanding Security Threats

Welcome to the IT Security course of the IT Support Professional Certificate! In the first week of this course, we will cover the basics of security in an IT environment. We will learn how to define and recognize security risks, vulnerabilities and threats. We’ll identify the most common security attacks in an organization and understand how security revolves around the “CIA” principle. By the end of this module, you will know the types of malicious software, network attacks, client-side attacks, and the essential security terms you’ll see in the workplace.

  • Course Introduction
  • The CIA Triad
  • Essential Security Terms
  • Malicious Software
  • Malware Continued
  • Network Attacks
  • Denial-of-Service
  • Client-Side Attacks
  • Password Attacks
  • Deceptive Attacks
  • Navigating Coursera
  • Program Surveys
  • How to Use Discussion Forums
  • Get to Know Your Classmates
  • Supplemental Reading for Malicious Software
  • Supplemental Reading for Network Attacks
  • Supplemental Reading for DDoS Attacks
  • Malicious Software
  • Network Attacks
  • Other Attacks
  • Understanding Security Threats

Week 2: Pelcgbybtl (Cryptology)

In the second week of this course, we’ll learn about cryptology. We’ll explore different types of encryption practices and how they work. We’ll show you the most common algorithms used in cryptography and how they’ve evolved over time. By the end of this module, you’ll understand how symmetric encryption, asymmetric encryption, and hashing work; you’ll also know how to choose the most appropriate cryptographic method for a scenario you may see in the workplace.

  • Cryptography
  • Symmetric Cryptography
  • Symmetric Encryption Algorithms
  • Rob What a Security Engineer Does
  • Asymmetric Cryptography
  • Asymmetric Encryption Algorithms
  • Hashing
  • Hashing Algorithms
  • Hashing Algorithms (continued)
  • Public Key Infrastructure
  • Cryptography in Action
  • Securing Network Traffic
  • Cryptographic Hardware
  • Rejection
  • Supplemental Reading for The Future of Cryptanalysis
  • Supplemental Reading for Symmetric Encryptions
  • Supplemental Reading for Asymmetric Encryption Attack
  • Supplemental Reading for SHA1 Attacks
  • Supplemental Reading for the X.509 Standard
  • Supplemental Reading for PGP
  • Supplemental Reading for Securing Network Traffic
  • Supplemental Reading for TPM Attacks
  • Instructions for Accessing Linux and Windows Qwiklabs
  • Symmetric Encryption
  • Public Key or Asymmetric Encryption
  • Hashing
  • Cryptography Applications
  • Week Two Practice Quiz

Week 3: AAA Security (Not Roadside Assistance)

In the third week of this course, we’ll learn about the “three A’s” in cybersecurity. No matter what type of tech role you’re in, it’s important to understand how authentication, authorization, and accounting work within an organization. By the end of this module, you’ll be able to choose the most appropriate method of authentication, authorization, and level of access granted for users in an organization.

  • Authentication Best Practices
  • Multifactor Authentication
  • Certificates
  • LDAP
  • RADIUS
  • Kerberos
  • TACACS+
  • Single Sign-On
  • Rob Path to IT
  • Authorization and Access Control Methods
  • Access Contro
  • Access Control List
  • Tracking Usage and Access
  • Rob Important Skills in Security
  • Supplemental Reading for Authentication
  • Supplemental Reading for Authorization
  • Authentication
  • Authorization and Accounting
  • AAA Security (Not Roadside Assistance)

Week 4: Securing Your Networks

In the fourth week of this course, we’ll learn about secure network architecture. It’s important to know how to implement security measures on a network environment, so we’ll show you some of the best practices to protect an organization’s network. We’ll learn about some of the risks of wireless networks and how to mitigate them. We’ll also cover ways to monitor network traffic and read packet captures. By the end of this module, you’ll understand how VPNs, proxies and reverse proxies work; why 802.1X is a super important for network protection; understand why WPA/WPA2 is better than WEP; and know how to use tcpdump to capture and analyze packets on a network. That’s a lot of information, but well worth it for an IT Support Specialist to understand!

  • Network Hardening Best Practices
  • Network Hardware Hardening
  • Network Software Hardening
  • Joe Personal Obstacle
  • WEP Encryption and Why You Shouldn’t Use It
  • Let’s Get Rid of WEP! WPA/WPA2
  • Wireless Hardening
  • Heather Social Engineering
  • Sniffing the Network
  • Wireshark and tcpdump
  • Intrusion Detection/Prevention System
  • Supplemental Reading for Network Hardening Best Practices
  • Supplemental Reading on IEEE 802.1X
  • Supplementary reading on HAProxy, nginx and Apache HTTP server
  • Supplementary reading for WEP Encryption and Why You Shouldn’t Use It
  • Supplementary reading on WiFi Protected Setup (WPS) PIN brute force vulnerability
  • Supplemental Reading for Promiscuous Mode
  • Supplemental reading for Intrusion Detection/Prevention System
  • Secure Network Architecture
  • Wireless Security
  • Network Monitoring
  • Week Four Practice Quiz

Week 5: Defense in Depth

In the fifth week of this course, we’re going to go more in-depth into security defense. We’ll cover ways to implement methods for system hardening, application hardening, and determine the policies for OS security. By the end of this module, you’ll know why it’s important to disable unnecessary components of a system, learn about host-based firewalls, setup anti-malware protection, implement disk encryption, and configure software patch management and application policies.

  • Intro to Defense in Depth
  • Disabling Unnecessary Components
  • Host-Based Firewal
  • Logging and Auditing
  • Antimalware Protection
  • Disk Encryption
  • Heather Self Learning
  • Software Patch Management
  • Application Policies
  • Supplemental Reading for Logging and Auditing
  • Supplemental Readings for Antimalware Protection
  • Supplemental Reading for Disk Encryption
  • System Hardening
  • Application Hardening
  • Defense in Depth

Week 6: Creating a Company Culture for Security

Congratulations, you’ve made it to the final week in the course! In the last week of this course, we’ll explore ways to create a company culture for security. It’s important for any tech role to determine appropriate measures to meet the three goals of security. By the end of this module, you will develop a security plan for an organization to demonstrate the skills you’ve learned in this course. You’re almost done, keep up the great work!

  • Security Goals
  • Measuring and Assessing Risk
  • Privacy Policy
  • User Habits
  • Third-Party Security
  • Security Training
  • Alex Grit Story
  • Incident Reporting and Analysis
  • Incident Response and Recovery
  • Mobile Security and Privacy
  • Amir Interview
  • Ari Interview
  • Interview Role Play: Security
  • Final Assessment
  • Framing yourself
  • Congratulations!
  • Supplemental Reading for Risk in the Workplace
  • Supplemental Reading for User Habits
  • Supplemental Reading for Vendor Security Assessment Questionnaires
  • Supplemental Readings for Mobile Security and Privacy
  • Invitation to Sign Up for Big Interview
  • Final Project – Sample Submission
  • How to Add Google IT Support Certificate to Your Resume and LinkedIn Profile
  • Common Job Search Terms
  • Information and FAQs about badges
  • [Limited Opportunity] Pilot Handshake for Google Career Certificate Graduates!
  • Risk in the Workplace
  • Users
  • Incident Handling
  • Creating a Company Culture for Security
  • Creating a Company Culture for Security – Design Document
  • Your Access to Google Job Search Resources

Get Course Enrolment Link

Download will begin automatically in 60 seconds.

Generating Download Link…


How to Enroll at Discounted Price?

  • Click on above Enrolment Link
  • Complete the purchase process on Coursera
  • Send us the invoice and Screenshot of the payment: Click Here to Send
  • We’ll Refund your additional Cashback within 3-4 Working Days

Enroll on Coursera

IT Security: Defense against the digital dark arts

In our experience, we suggest you enroll in “” courses and gain some new skills from Professionals completely free and we assure you will be worth it.

“” course is available on Coursera and Courselers at Discounted Price, just visit Courselers to get “”

Conclusion:

I hope this “” Course would be useful for you to learn something new from this Course. If it helped you then don’t forget to bookmark our site for more Free and Discounted Courses

This course is intended for audiences of all experiences who are interested in learning about new skills in a business context; there are no prerequisite courses.

Keep Learning!

More Free Courses >>

AWS Certified Security Specialty 2022 Free Download

Part 2: AWS Certified Solutions Architect SAA C02 Free Download

Part 1: AWS Certified Solutions Architect SAA C02 Free Download

Amazon Web Services (AWS) Certified 2022 – 4 Certifications! Free Download

Leave a Reply

Your email address will not be published.