We may earn an affiliate commission when you visit our partners.
Course image
Google Career Certificates

This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.

Read more

This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.

At the end of this course, you’ll understand:

● how various encryption algorithms and techniques work as well as their benefits and limitations.

● various authentication systems and types.

● the difference between authentication and authorization.

● how to evaluate potential risks and recommend ways to reduce risk.

● best practices for securing a network.

● how to help others to grasp security concepts and protect themselves.

Enroll now

What's inside

Syllabus

Understanding Security Threats
Welcome to the IT Security course of the IT Support Professional Certificate! In the first module of this course, we will cover the basics of security in an IT environment. We will learn how to define and recognize security risks, vulnerabilities and threats. We'll identify the most common security attacks in an organization and understand how security revolves around the "CIA" principle. By the end of this module, you will know the types of malicious software, network attacks, client-side attacks, and the essential security terms you'll see in the workplace.
Read more
Pelcgbybtl (Cryptology)
In the second module of this course, we'll learn about cryptology. We'll explore different types of encryption practices and how they work. We'll show you the most common algorithms used in cryptography and how they've evolved over time. By the end of this module, you'll understand how symmetric encryption, asymmetric encryption, and hashing work; you'll also know how to choose the most appropriate cryptographic method for a scenario you may see in the workplace.
The 3 A's of Cybersecurity: Authentication, Authorization, Accounting
In the third module of this course, we'll learn about the "three A's" in cybersecurity. No matter what type of tech role you're in, it's important to understand how authentication, authorization, and accounting work within an organization. By the end of this module, you'll be able to choose the most appropriate method of authentication, authorization, and level of access granted for users in an organization.
Securing Your Networks
In the fourth module of this course, we'll learn about secure network architecture. It's important to know how to implement security measures on a network environment, so we'll show you some of the best practices to protect an organization's network. We'll learn about some of the risks of wireless networks and how to mitigate them. We'll also cover ways to monitor network traffic and read packet captures. By the end of this module, you'll understand how VPNs, proxies and reverse proxies work; why 802.1X is a super important for network protection; understand why WPA/WPA2 is better than WEP; and know how to use tcpdump to capture and analyze packets on a network. That's a lot of information, but well worth it for an IT Support Specialist to understand!
Defense in Depth
In the fifth module of this course, we're going to go more in-depth into security defense. We'll cover ways to implement methods for system hardening, application hardening, and determine the policies for OS security. By the end of this module, you'll know why it's important to disable unnecessary components of a system, learn about host-based firewalls, setup anti-malware protection, implement disk encryption, and configure software patch management and application policies.
Creating a Company Culture for Security
Congratulations, you've made it to the final module in the course! In the last module of this course, we'll explore ways to create a company culture for security. It's important for any tech role to determine appropriate measures to meet the three goals of security. By the end of this module, you will develop a security plan for an organization to demonstrate the skills you've learned in this course. You're almost done, keep up the great work!
Prepare for Jobs in IT Support
You will engage in a series of interactive activities based on concepts you’ve explored and skills you’ve gained throughout the program. You’ll also explore job readiness skills, develop your resume, and practice interviewing for jobs.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches concepts, tools, and security best practices commonly used in industry
Covers various encryption algorithms, authentication systems, network security solutions, and security architecture
Emphasizes the importance of a culture of security within organizations
Introduces cryptology, including encryption and hashing algorithms
Explores the three pillars of information security: authentication, authorization, and accounting
Requires some prior knowledge and experience in IT security

Save this course

Save IT Security: Defense against the digital dark arts to your list so you can find it easily later:
Save

Reviews summary

*information security's central role*

The final course in this *Google IT Support Professional Certificate* program is an exploration of the critical role information security plays in modern organizations. Designed for learners with an interest in pursuing a career in IT support, this course covers essential concepts like security risks, vulnerabilities, and threats, as well as key security strategies and best practices. Through videos, readings, and hands-on exercises, this course equips learners with the knowledge and skills necessary to effectively protect information assets and maintain the integrity and confidentiality of data.
Organizations rely on information security to protect valuable assets, ensure business continuity, and maintain customer trust. Information security professionals play a vital role in safeguarding data from unauthorized access, use, disclosure, disruption, modification, or destruction.
"Organizations rely on information security to protect valuable assets, ensure business continuity, and maintain customer trust."
"Information security professionals play a vital role in safeguarding data from unauthorized access, use, disclosure, disruption, modification, or destruction."
Organizations implement security strategies to protect their assets and mitigate risks. These strategies include implementing security controls, conducting security audits, and training employees on security best practices.
"Organizations implement security strategies to protect their assets and mitigate risks."
Organizations should adopt security best practices to enhance their security posture. These practices include using strong passwords, implementing multi-factor authentication, and regularly updating software and systems.
"Organizations should adopt security best practices to enhance their security posture."
Organizations face various security risks, including cyberattacks, insider threats, and natural disasters. Understanding these risks is crucial for developing effective security measures.
"Organizations face various security risks, including cyberattacks, insider threats, and natural disasters."
Security vulnerabilities are weaknesses in systems, software, or processes that can be exploited by attackers. It's essential to identify and address vulnerabilities to prevent security breaches.
"Security vulnerabilities are weaknesses in systems, software, or processes that can be exploited by attackers."
Security threats are malicious actors or events that can exploit vulnerabilities and cause harm to an organization or its assets. Common threats include malware, phishing, and social engineering.
"Security threats are malicious actors or events that can exploit vulnerabilities and cause harm to an organization or its assets."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in IT Security: Defense against the digital dark arts with these activities:
Organize and Summarize Course Materials
Improve your retention and understanding by organizing and summarizing the course materials in your own words.
Show steps
  • Review lecture notes, readings, and other course materials.
  • Create a structured outline or summary that captures the key concepts and takeaways.
  • Identify areas where you need further clarification or practice.
Review 'Cryptography and Network Security'
Explore the foundational principles of cryptography and network security to solidify your understanding of the concepts covered in the course.
Show steps
  • Read chapters 1-3 of the book.
  • Summarize the key concepts and terminologies introduced in each chapter.
  • Identify real-world examples of the cryptographic and network security principles discussed.
Follow Tutorials on Encryption Algorithms
Reinforce your understanding of encryption algorithms and their applications by working through hands-on tutorials.
Browse courses on Encryption Algorithms
Show steps
  • Explore video tutorials on symmetric and asymmetric encryption algorithms.
  • Follow step-by-step guides to implement encryption algorithms in code.
  • Test and analyze the performance of different encryption algorithms.
Five other activities
Expand to see all activities and additional details
Show all eight activities
Discuss IT Security Best Practices
Engage in peer discussions to exchange perspectives and deepen your understanding of industry best practices in IT security.
Browse courses on Information Security
Show steps
  • Join a study group or online forum dedicated to IT security.
  • Participate in discussions on topics such as secure network configurations, access control, and incident response.
  • Share experiences and case studies to learn from the insights of others.
Wireshark Packet Analysis Exercises
Enhance your network security analysis skills by performing hands-on exercises with Wireshark.
Browse courses on network security
Show steps
  • Capture network traffic using Wireshark.
  • Analyze captured packets to identify security threats and vulnerabilities.
  • Filter and inspect packets based on specific criteria.
Attend Security Vulnerability Assessments
Gain practical insights into security vulnerability assessments by participating in real-world workshops.
Browse courses on network security
Show steps
  • Register for a security vulnerability assessment workshop.
  • Participate in hands-on exercises to identify and mitigate vulnerabilities in a simulated network environment.
  • Interact with industry experts to learn best practices for vulnerability management.
Develop a Security Awareness Training Module
Solidify your understanding of security concepts by creating a training module that educates others about IT security best practices.
Show steps
  • Research best practices and resources for security awareness training.
  • Develop engaging content that covers key topics such as phishing, malware, and password security.
  • Design interactive exercises and assessments to reinforce learning.
Provide Mentorship to Junior IT Professionals
Reinforce your own knowledge and gain valuable leadership experience by mentoring junior IT professionals.
Show steps
  • Connect with junior IT professionals through mentorship programs or online communities.
  • Provide guidance on technical topics, career development, and industry best practices.
  • Share your experiences and insights to help mentees overcome challenges and achieve their goals.

Career center

Learners who complete IT Security: Defense against the digital dark arts will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts help protect companies from cyber attacks. They implement a variety of security measures, from firewalls and intrusion detection systems to security policies and procedures. To succeed in this role, you need to understand the latest security threats and how to counter them. This course will provide you with the knowledge and skills to get started as an Information Security Analyst. You will learn about cryptography, authentication, network security, and more.
Security Architect
Security Architects design and implement security solutions for organizations. They work to protect systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction. To succeed in this role, you need to have a deep understanding of security principles and best practices. This course will provide you with the knowledge and skills to design and implement security solutions that meet the needs of your organization.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain security systems to protect networks and data from unauthorized access. To succeed in this role, you need to have a strong understanding of security technologies and protocols. As a Cybersecurity Engineer, you will be responsible for protecting your company's systems and data from cyber threats. This course will provide you with the knowledge and skills to succeed in this role.
Network Security Engineer
Network Security Engineers design, implement, and maintain security measures to protect networks from unauthorized access. They work to prevent network attacks, such as hacking and malware, and to ensure that networks are secure and reliable. To succeed in this role, you need to have a deep understanding of networking and security technologies. This course will provide you with the knowledge and skills to succeed as a Network Security Engineer. You will learn about network security principles, technologies, and best practices.
Security Consultant
Security Consultants provide security advice and guidance to organizations. They help organizations to identify, assess, and mitigate security risks. To succeed in this role, you need to have a deep understanding of security principles and best practices. This course will provide you with the knowledge and skills to succeed as a Security Consultant. You will learn about security risks, vulnerabilities, and countermeasures.
Cloud Security Engineer
Cloud Security Engineers design, implement, and maintain security measures to protect cloud computing environments. They work to protect cloud-based systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction. As a Cloud Security Engineer, you need to have a deep understanding of cloud computing technologies and security principles. This course will provide you with the knowledge and skills to design and implement secure cloud computing solutions.
Security Analyst
Security Analysts monitor and analyze security data to identify threats and vulnerabilities. They also investigate security incidents and provide recommendations on how to mitigate risks. To succeed in this role, you need to have a strong understanding of security principles and best practices. This course will provide you with the knowledge and skills to become a Security Analyst. You will learn about security threats, vulnerabilities, and countermeasures.
Ethical Hacker
Ethical Hackers use their knowledge of hacking techniques to identify vulnerabilities in systems and networks. They help organizations to fix these vulnerabilities and improve their security posture. To succeed in this role, you need to have a strong understanding of hacking techniques and security principles. This course will provide you with the knowledge and skills to become an Ethical Hacker.
IT Manager
IT Managers plan, implement, and manage IT systems and services. They also oversee IT staff and ensure that IT systems are running smoothly. To succeed in this role, you need to have a deep understanding of IT systems and technologies. This course will provide you with the knowledge and skills to succeed as an IT Manager. You will learn about IT infrastructure, security, and management.
Computer Hardware Engineer
Computer Hardware Engineers design, develop, and maintain computer hardware. They work to ensure that computer hardware is reliable, efficient, and secure. To succeed in this role, you need to have a strong understanding of computer hardware technologies. This course will provide you with the knowledge and skills to become a Computer Hardware Engineer. You will learn about computer hardware, security, and testing.
Software Engineer
Software Engineers design, develop, and maintain software applications. They work to ensure that software applications are secure, reliable, and efficient. To succeed in this role, you need to have a strong understanding of software development principles and best practices. This course will provide you with the knowledge and skills to become a Software Engineer. You will learn about software development, security, and testing.
Computer Science Teacher
Computer Science Teachers teach computer science concepts and skills to students. They help students to develop problem-solving, critical thinking, and creativity skills. To succeed in this role, you need to have a deep understanding of computer science principles and best practices. This course will provide you with the knowledge and skills to become a Computer Science Teacher. You will learn about computer science concepts, teaching methods, and assessment techniques.
Technical Writer
Technical Writers create and maintain technical documentation. They work to ensure that technical documentation is clear, accurate, and complete. To succeed in this role, you need to have a strong understanding of technical concepts and writing principles. This course will provide you with the knowledge and skills to become a Technical Writer. You will learn about technical writing, security, and documentation.
Business Analyst
Business Analysts help organizations to identify and solve business problems. They work to improve business processes and systems. To succeed in this role, you need to have a strong understanding of business processes and systems. This course will provide you with the knowledge and skills to become a Business Analyst. You will learn about business analysis, security, and risk management.
Data Analyst
Data Analysts collect, analyze, and interpret data to help organizations make better decisions. To succeed in this role, you need to have a strong understanding of data analysis techniques and technologies. This course will provide you with the knowledge and skills to become a Data Analyst. You will learn about data analysis, security, and visualization.

Reading list

We've selected 15 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in IT Security: Defense against the digital dark arts .
Covers the principles and practices of cryptography and network security in depth, providing a comprehensive overview of the field.
Provides a practical overview of network security, covering the essential concepts, applications, and standards.
Provides a comprehensive overview of cryptography, covering the mathematical foundations and practical applications.
Provides a practical guide to implementing zero trust security, covering the concepts and technologies involved.
Classic reference on TCP/IP, providing a detailed overview of the protocols and their implementation.
Provides a practical guide to security engineering, covering the design and implementation of secure systems.
Provides a practical overview of network security, covering the essential concepts and technologies.
Provides insights into the human element of security, covering social engineering and other techniques used by attackers.
Provides a popular overview of cryptography, covering the history and development of the field.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to IT Security: Defense against the digital dark arts .
SQL Server Security Fundamentals
Most relevant
AWS: Security in Data Analytics
Most relevant
SnowPro Core: Account Access and Security
Most relevant
Authorization and Managing Identity in Azure
Most relevant
Secure Couchbase 6 Clusters
Most relevant
Laravel: Configure, Validate, Authenticate and Authorize
Most relevant
Cisco Data Center Core: Applying Network, Compute, and...
Most relevant
CompTIA ITF+: Security
Most relevant
Cryptography: The Big Picture
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser