We may earn an affiliate commission when you visit our partners.
Course image
Shadow Farrell

Students will learn about the security management process. They will examine risk and risk management, including quantitative and qualitative risk assessments. The course includes discussion of security control types and physical security controls. Students will explore all aspects of Identity and Access Management (IAM) including single-factor and multi-factor authentication, account and access control, single sign-on and federation. Students will learn to harden endpoint devices including mobile and IoT devices. Students explore cryptography including symmetric and asymmetric encryption, hashing and digital signatures, and using Public Key Infrastructure (PKI) to create and manage certificates. Students explore network security including defense in depth, firewalls, IDS/IPS, wireless security, remote access, and cloud computing. Students explore vulnerability management, ethical hacking, and compliance. Then they learn about attackers, social engineering, malware, software/network attacks, wireless and password attacks. Students learn about incident response, forensics, and planning for business continuity. Labs encourage students to apply security concepts to their personal lives, practice applying security to networks, and even include hacking and forensic simulations. At the end of the course, students will complete a capstone project to demonstrate mastery of course objectives and use for personal branding.

Enroll now

What's inside

Syllabus

Security Fundamentals
In this module, you will explore the information security cycle including the concepts of security, risk and the security management process. Then you will leqarn about physical security including the different control types and physical security controls from each type, and addressing environmental exposures.
Read more
Authentication and Account Management
In this module, you will explore authentication in depth including learning about authentication factors, multi-factor and single-factor authentication, and strong passwords. You will learn about account management including multiple and shared accounts, single sign-on and access control.
Device Security
In this module, you will learn about securing endpoints including patch management and application control. You will explore integrating mobile and IoT devices, and the effects of location services.
Encryption
In this module, you will learn the basics of cryptography including the difference between symmetric and asymmetric encryption, and some of the algorithms. You will learn about hashes and digital certificates and understand the fundamentals of a Public Key Infrastructure.
Network Security
In this module, you will review network components and learn about defense in depth including firewalls and intrusion detection/prevention systems. You will learn about extending the network perimeter including wireless networks, cloud services and remote access.
Security Management
In this module, you will learn about vulnerability scanning and ethical hacking. You will explore data security, security policies, and gain a deeper understanding of risk. You will also learn about compliance.
Security Threats
In this module, you will learn about attackers and attacks. You will learn about the concepts behind social engineering and some of the more common social engineering attacks. You will learn about web attacks, malware, software attacks, wireless attacks and password attacks.
Managing Security Incidents
In this module, you will learn about how to manage security incidents including prevention techniques. You will gain an understanding of incident response, forensics, business continuity, redundancy, the disaster recovery process, RAID and backups.
Capstone
Students will demonstrate mastery of the material by creating and uploading a capstone project.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Taught by Shadow Farrell, who is recognized for their work in security
Develops safe network practices and protocols, which are core skills for cybersecurity
Develops skills in identifying and protecting against cyber attacks
Taught by instructors with hands-on experience in security
May be relevant for beginners who are looking to develop a foundation in cybersecurity

Save this course

Save Introduction to IT Security to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Introduction to IT Security with these activities:
Review Security Concepts from Previous Coursework
Revisit fundamental security principles to strengthen the foundation for this course.
Browse courses on Security Concepts
Show steps
  • Review notes and materials from previous security courses.
  • Take practice quizzes or solve problems to test your understanding.
Review Basic Encryption Practices
Secure communication begins with encryption, and getting a refresher will prepare you for the key concepts of encryption that are used in this course.
Show steps
  • Read a short article or blog post on symmetric vs. asymmetric encryption.
  • Review the concept of digital certificates and PKI.
Read 'Cryptography and Network Security: Principles and Practice' by William Stallings
Gain a deep understanding of cryptographic principles and their application in network security.
Show steps
  • Read Chapters 1-5 to understand basic concepts of cryptography.
  • Read Chapters 6-10 to learn about network security protocols and applications.
  • Read Chapters 11-15 to explore advanced topics such as authentication and access control.
Eight other activities
Expand to see all activities and additional details
Show all 11 activities
Practice Network Defense Configuration
Security defenses depend on careful configuration and management of network devices. Lab exercises will boost your confidence in security device management.
Browse courses on Firewall Configuration
Show steps
  • Set up a basic firewall on a virtual machine
  • Configure an intrusion detection system (IDS) to monitor network traffic
Practice Vulnerability Scanning with Nessus
Develop hands-on experience in identifying vulnerabilities using industry-leading tools.
Browse courses on Vulnerability Scanning
Show steps
  • Install Nessus on your computer.
  • Configure Nessus to scan a target network or system.
  • Run a vulnerability scan and analyze the results.
Follow Tutorials on Ethical Hacking Techniques
Learn about common hacking techniques and how to ethically test security systems.
Browse courses on Ethical Hacking
Show steps
  • Find reputable online tutorials on ethical hacking.
  • Follow the tutorials step-by-step, practicing the techniques in a safe environment.
  • Document your findings and analysis.
Design a Security Plan
Create a comprehensive security plan that addresses risk identification, assessment, and mitigation strategies.
Browse courses on Security Management
Show steps
  • Identify potential security risks and threats.
  • Assess the likelihood and impact of identified risks.
  • Develop strategies to mitigate identified risks.
  • Document the security plan and present it to relevant stakeholders.
Explore Password Cracking Techniques
Understanding password cracking techniques helps you evaluate password security and implement better password policies.
Browse courses on Ethical Hacking
Show steps
  • Follow a tutorial on how to use a password cracking tool
  • Learn about common password cracking methods, such as brute force and dictionary attacks
Develop a Cybersecurity Awareness Campaign
Create engaging content to educate users about cybersecurity risks and best practices.
Browse courses on Cybersecurity Awareness
Show steps
  • Identify the target audience for the campaign.
  • Develop a message and materials that resonate with the audience.
  • Choose communication channels to reach the target audience.
  • Implement the campaign and track its effectiveness.
Contribute to Open Source Security Projects
Collaborate with others to enhance cybersecurity tools and technologies.
Browse courses on Open Source
Show steps
  • Identify open source security projects that align with your interests.
  • Read the project documentation and contribute to discussions.
  • Make bug fixes, feature enhancements, or contribute to testing efforts.
Mentor a Junior Cybersecurity Professional
Share your knowledge and experience to help others develop their cybersecurity skills.
Browse courses on Mentoring
Show steps
  • Find a junior cybersecurity professional who could benefit from your mentorship.
  • Establish a regular meeting schedule and provide guidance on their career path.
  • Share your knowledge and insights to help them overcome challenges.

Career center

Learners who complete Introduction to IT Security will develop knowledge and skills that may be useful to these careers:
Security Architect
Security Architects design and implement security measures to protect an organization's computer networks and systems. They also develop and maintain security policies and procedures. As a Security Architect, one might spend their career working on cryptography, network security, or ethical hacking. This course may be useful as the modules on cryptography, network security, and ethical hacking will be useful for a Security Architect. Additionally, this course has modules on authentication, device security, and incident response.
Information Security Analyst
An Information Security Analyst can protect computer networks and systems from cyber attacks. Individuals who are just getting started in this career might be in roles like a Security Analyst or Junior Information Security Analyst. As an Information Security Analyst, you might spend part of your career working in penetration testing or vulnerability assessment. This course may be useful as it has modules on security management, encryption, network security, ethical hacking, and incident response.
IT Auditor
IT Auditors evaluate the security of computer systems and networks. They also make recommendations for improving security. It is common for IT Auditors to work in risk and compliance. This course may be useful for someone interested in IT Auditing due to its modules on risk and risk management, security control types, compliance, and incident response. While this course does not explicitly discuss IT Auditing, the knowledge it provides about security management, compliance, and incident response may be useful to IT Auditors.
Security Consultant
Security Consultants help organizations to improve their security posture. They assess risks, develop security plans, and implement security measures. Security Consultants usually have backgrounds in information security or computer science. They may specialize in areas including penetration testing, vulnerability assessment, and ethical hacking. This course may be useful as it has modules on security management, risk and risk management, ethical hacking, and incident response.
Network Administrator
Network Administrators are responsible for maintaining and securing an organization's computer networks. They also troubleshoot problems and make sure that the network is running smoothly. Network Administrators may specialize in data encryption or wireless security. This course may be useful as it has modules on authentication, device security, network security, and wireless security.
Security Analyst
Security Analysts monitor and analyze security data to identify threats and vulnerabilities. They also develop and implement security measures to protect against threats. Security Analysts often specialize in areas such as threat intelligence, vulnerability management, and incident response. This course may be useful as it has modules on security management, risk and risk management, vulnerability management, and incident response.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain security systems to protect computer networks and systems. They also respond to security incidents and investigate security breaches. Cybersecurity Engineers often specialize in networking, operating systems, and security software. This course may be useful as it has modules on network security, encryption, authentication, and incident response.
Compliance Officer
Compliance Officers ensure that an organization complies with laws and regulations. They also develop and implement compliance policies and procedures. Compliance Officers often specialize in areas such as privacy law, data security, and risk management. This course may be useful as it has modules on security management, compliance, and risk and risk management.
Forensic Computer Analyst
Forensic Computer Analysts investigate computer crimes and cyber attacks. They also recover and analyze electronic evidence. Forensic Computer Analysts often specialize in areas such as digital forensics, cybercrime investigation, and incident response. This course may be useful as it has modules on incident response, forensics, and ethical hacking.
Cloud Security Engineer
Cloud Security Engineers design and implement security measures to protect cloud-based systems and data. They also respond to security incidents and investigate security breaches. Cloud Security Engineers often specialize in areas such as cloud architecture, cloud security, and cloud compliance. This course may be useful as it has modules on network security, encryption, and cloud computing.
Penetration Tester
Penetration Testers identify vulnerabilities in computer systems and networks. They use a variety of techniques to simulate attacks and identify weaknesses. Penetration Testers often specialize in areas such as network security, web application security, and mobile security. This course may be useful as it has modules on ethical hacking, network security, and vulnerability management.
Information Security Manager
Information Security Managers are responsible for overseeing the security of an organization's information systems and data. They develop and implement security policies and procedures and manage the security team. Information Security Managers often specialize in areas such as information security, risk management, and compliance. This course may be useful as it has modules on security management, risk and risk management, and authentication.
Risk Manager
Risk Managers identify, assess, and mitigate risks to an organization's operations and assets. They also develop and implement risk management plans and procedures. Risk Managers often specialize in areas such as financial risk, operational risk, and compliance risk. This course may be useful as it has modules on risk and risk management, security management, and vulnerability management.
Security Operations Center Analyst
Security Operations Center Analysts monitor and analyze security data to identify threats and vulnerabilities. They also respond to security incidents and investigate security breaches. Security Operations Center Analysts often specialize in areas such as threat intelligence, incident response, and security monitoring. This course may be useful as it has modules on security management, incident response, and network security.
Data Protection Officer
Data Protection Officers are responsible for ensuring that an organization's data is protected from unauthorized access, use, disclosure, or destruction. They develop and implement data protection policies and procedures. Data Protection Officers may specialize in areas such as privacy law, data security, and risk management. This course may be useful as it has modules on security management, risk and risk management, authentication, and encryption.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Introduction to IT Security.
This document provides a comprehensive set of security and privacy controls for information systems and organizations. It valuable resource for anyone who is responsible for the security of an information system or organization.
Provides a comprehensive overview of cryptography and network security. It valuable resource for anyone who wants to learn more about these topics.
Provides insights into the mind of a social engineer and offers practical advice on how to protect yourself from social engineering attacks.
Provides a comprehensive overview of security engineering. It valuable resource for anyone who is interested in learning more about how to build secure systems.
Provides a comprehensive overview of malware analysis. It valuable resource for anyone who is interested in learning more about how to analyze malware.
Provides a comprehensive overview of computer security. It valuable resource for anyone who is interested in learning more about computer security.
Provides a comprehensive overview of hacking. It valuable resource for anyone who is interested in learning more about how to hack.
Comprehensive guide to network security fundamentals. It valuable resource for anyone who is preparing for the Security+ certification exam.
Provides a step-by-step guide to protecting your network. It valuable resource for anyone who is responsible for the security of a network.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Introduction to IT Security.
Risk Management for Cyber Security Managers
Most relevant
Ethical Hacking using Kali Linux from A to Z
Most relevant
The Complete Cyber Security Course : Network Security!
Most relevant
Specialized Attacks: Wireless
Most relevant
Ethical Hacking: Hacking Wireless Networks
Most relevant
Splunk Enterprise Administration: Managing Users and...
Most relevant
Health, Safety and Wellness in Mining
Home Networking Basics
Ethical Hacking: Hacking IoT and OT
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser