What you'll learn
Understanding Security Threats
Pelcgbybtl (Cryptology)
AAA Security (Not Roadside Assistance)
Securing Your Networks
Defense in Depth
Creating a Company Culture for Security
Description
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. Finally, we’ll go through a case study, where we examine the security model of Chrome OS. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.
At the end of this course, you’ll understand:
● how various encryption algorithms and techniques work as well as their benefits and limitations.
● various authentication systems and types.
● the difference between authentication and authorization.
● how to evaluate potential risks and recommend ways to reduce risk.
● best practices for securing a network.
● how to help others to grasp security concepts and protect themselves.
Requirements
Access to a computer or mobile device with an internet connection.
Motivation to learn!
There are no special materials or prerequisite knowledge required for this course.
Who this course is for
Students who are new to this field
Students willing to put in a couple hours to learn about IT Security: Defense against the digital dark arts
Advanced students wanting to add another skill to their portfolio
Content Creator
This course includes
Participation Confirmation/Certificate
Option for learning at your own pace
Videos and reading material about the course
Practice tests
Assessed tasks with feedback from other course participants
Evaluated tests with feedback
Evaluated programming tasks
Got something to discuss?