This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.
通过 Coursera Plus 提高技能,仅需 239 美元/年(原价 399 美元)。立即节省

IT Security: Defense against the digital dark arts
本课程是 Google IT Support 专业证书 的一部分

位教师:Google Career Certificates
528,051 人已注册
包含在 中
您将获得的技能
- 类别:IT Security ArchitectureIT Security Architecture
- 类别:AuthenticationsAuthentications
- 类别:Security ManagementSecurity Management
- 类别:CryptographyCryptography
- 类别:Wireless NetworksWireless Networks
- 类别:Security AwarenessSecurity Awareness
- 类别:CybersecurityCybersecurity
- 类别:Network SecurityNetwork Security
- 类别:AI EnablementAI Enablement
- 类别:Threat DetectionThreat Detection
- 类别:HardeningHardening
- 类别:EncryptionEncryption
- 类别:Malware ProtectionMalware Protection
- 类别:Authorization (Computing)Authorization (Computing)
您将学习的工具
- 类别:FirewallFirewall
要了解的详细信息

添加到您的领英档案
26 项作业
积累 Security 领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 通过 Google 获得可共享的职业证书

该课程共有7个模块
Welcome to the IT Security course of the IT Support Professional Certificate! In the first module of this course, we will cover the basics of security in an IT environment. We will learn how to define and recognize security risks, vulnerabilities and threats. We'll identify the most common security attacks in an organization and understand how security revolves around the "CIA" principle. By the end of this module, you will know the types of malicious software, network attacks, client-side attacks, and the essential security terms you'll see in the workplace.
涵盖的内容
10个视频8篇阅读材料4个作业
10个视频• 总计33分钟
- Course Introduction• 5分钟
- The CIA Triad• 2分钟
- Essential Security Terms• 4分钟
- Malicious Software• 5分钟
- Malware Continued• 3分钟
- Network Attacks• 3分钟
- Denial-of-Service• 3分钟
- Client-Side Attacks• 2分钟
- Password Attacks• 2分钟
- Deceptive Attacks• 3分钟
8篇阅读材料• 总计30分钟
- Helpful resources and tips• 4分钟
- Antimalware Protection, Malware Removal• 4分钟
- Learn About Malicious Software Attacks• 1分钟
- Learn About Network Attacks• 1分钟
- Supplemental Reading for DDoS Attacks• 4分钟
- Deceptive Attacks• 8分钟
- Physical Security• 4分钟
- Glossary terms from course 5, module 1• 4分钟
4个作业• 总计93分钟
- Test your knowledge: Malicious Software• 14分钟
- Test your knowledge: Network Attacks• 8分钟
- Test your knowledge: Other Attacks• 6分钟
- Module 1 challenge: Understanding Security Threats• 65分钟
In the second module of this course, we'll learn about cryptology. We'll explore different types of encryption practices and how they work. We'll show you the most common algorithms used in cryptography and how they've evolved over time. By the end of this module, you'll understand how symmetric encryption, asymmetric encryption, and hashing work; you'll also know how to choose the most appropriate cryptographic method for a scenario you may see in the workplace.
涵盖的内容
16个视频12篇阅读材料6个作业2个应用程序项目
16个视频• 总计75分钟
- Cryptography• 7分钟
- Symmetric Cryptography• 5分钟
- Symmetric Encryption Algorithms• 7分钟
- Rob: The work of a security engineer• 1分钟
- Asymmetric Cryptography• 4分钟
- Asymmetric vs. Symmetric Cryptography• 4分钟
- Asymmetric Encryption Algorithms• 5分钟
- Hashing• 3分钟
- Hashing Algorithms• 5分钟
- Hashing Algorithms (continued)• 5分钟
- Public Key Infrastructure• 6分钟
- Certificates• 3分钟
- Cryptography in Action• 8分钟
- Securing Network Traffic• 6分钟
- Cryptographic Hardware• 6分钟
- Rejection• 1分钟
12篇阅读材料• 总计42分钟
- Supplemental Reading for The Future of Cryptanalysis• 4分钟
- Supplemental Reading for Symmetric Encryptions• 1分钟
- Learn About an Asymmetric Encryption Attack• 1分钟
- Learn About SHA-1 Attacks• 2分钟
- Supplemental Reading for the X.509 Standard• 2分钟
- Learn About PGP• 1分钟
- Supplemental Reading for Securing Network Traffic• 2分钟
- Supplemental Reading for TPM Attacks• 1分钟
- Glossary terms from course 5, module 2• 4分钟
- Qwiklabs guidelines and troubleshooting steps• 8分钟
- Exemplar: Creating/inspecting key pair, encrypting/decrypting and sign/verify using OpenSSL• 8分钟
- Exemplar: Hands-on with hashing• 8分钟
6个作业• 总计108分钟
- Test your knowledge: Symmetric Encryption• 10分钟
- Test your knowledge: Public Key or Asymmetric Encryption• 6分钟
- Test your knowledge: Hashing• 8分钟
- Test your knowledge: Cryptography Applications• 6分钟
- Test your knowledge: Pelcgbybtl (Cryptology)• 28分钟
- Module 2 challenge: Pelcgbybtl (Cryptology)• 50分钟
2个应用程序项目• 总计120分钟
- Creating/inspecting key pair, encrypting/decrypting and sign/verify using OpenSSL• 60分钟
- Hands-on with Hashing• 60分钟
In the third module of this course, we'll learn about the "three A's" in cybersecurity. No matter what type of tech role you're in, it's important to understand how authentication, authorization, and accounting work within an organization. By the end of this module, you'll be able to choose the most appropriate method of authentication, authorization, and level of access granted for users in an organization.
涵盖的内容
14个视频5篇阅读材料3个作业
14个视频• 总计47分钟
- Best practices for authentication• 6分钟
- Multifactor Authentication• 6分钟
- Multifactor Authentication Options• 6分钟
- Certificates, Part Two• 3分钟
- RADIUS• 2分钟
- Kerberos• 7分钟
- TACACS+• 1分钟
- Single Sign-On• 3分钟
- Rob: My path to IT• 1分钟
- Authorization and Access Control Methods• 1分钟
- Access Control• 5分钟
- Access Control List• 1分钟
- Tracking Usage and Access• 2分钟
- Rob: Important skills in security• 2分钟
5篇阅读材料• 总计14分钟
- Physical Privacy and Security Components• 4分钟
- Supplemental Reading for Authentication• 1分钟
- Mobile Security Methods• 4分钟
- Learn About Authorization• 1分钟
- Glossary terms from course 5, module 3• 4分钟
3个作业• 总计87分钟
- Test your knowledge: Authentication• 26分钟
- Test your knowledge: Authorization and Accounting• 6分钟
- Module 3 challenge: Authentication, Authorization, Accounting• 55分钟
In the fourth module of this course, we'll learn about secure network architecture. It's important to know how to implement security measures on a network environment, so we'll show you some of the best practices to protect an organization's network. We'll learn about some of the risks of wireless networks and how to mitigate them. We'll also cover ways to monitor network traffic and read packet captures. By the end of this module, you'll understand how VPNs, proxies and reverse proxies work; why 802.1X is a super important for network protection; understand why WPA/WPA2 is better than WEP; and know how to use tcpdump to capture and analyze packets on a network. That's a lot of information, but well worth it for an IT Support Specialist to understand!
涵盖的内容
12个视频11篇阅读材料4个作业1个应用程序项目
12个视频• 总计64分钟
- Network Hardening Best Practices• 8分钟
- Network Hardware Hardening• 8分钟
- Network Software Hardening• 4分钟
- Joe: My personal obstacle• 1分钟
- WEP Encryption and Why You Shouldn't Use It• 8分钟
- Let's Get Rid of WEP!• 7分钟
- WPA2• 7分钟
- Wireless Hardening• 3分钟
- Heather: The impact of social engineering• 1分钟
- Sniffing the Network• 5分钟
- Wireshark and tcpdump• 6分钟
- Intrusion Detection/Prevention Systems• 6分钟
11篇阅读材料• 总计46分钟
- Supplemental Reading for Network Hardening Best Practices• 4分钟
- Supplemental Reading on IEEE 802.1X• 4分钟
- Supplementary reading on HAProxy, nginx and Apache HTTP server• 4分钟
- Supplementary reading for WEP Encryption and Why You Shouldn't Use It• 4分钟
- Supplementary reading on WiFi Protected Setup (WPS) PIN brute force vulnerability• 1分钟
- Learn About Promiscuous Mode• 1分钟
- Supplemental reading for Intrusion Detection/Prevention System• 4分钟
- Unified Threat Management (UTM) • 8分钟
- Home Network Security • 4分钟
- Exemplar: Introduction to tcpdump• 8分钟
- Glossary terms from course 5, module 4• 4分钟
4个作业• 总计82分钟
- Test your knowledge: Secure Network Architecture• 14分钟
- Test your knowledge: Wireless Security• 8分钟
- Test your knowledge: Network Monitoring• 10分钟
- Module 4 challenge: Securing Your Networks• 50分钟
1个应用程序项目• 总计60分钟
- Introduction to tcpdump• 60分钟
In the fifth module of this course, we're going to go more in-depth into security defense. We'll cover ways to implement methods for system hardening, application hardening, and determine the policies for OS security. By the end of this module, you'll know why it's important to disable unnecessary components of a system, learn about host-based firewalls, setup anti-malware protection, implement disk encryption, and configure software patch management and application policies.
涵盖的内容
9个视频6篇阅读材料3个作业
9个视频• 总计41分钟
- Intro to Defense in Depth• 1分钟
- Disabling Unnecessary Components• 4分钟
- Host-Based Firewall• 4分钟
- Logging and Auditing• 6分钟
- Antimalware Protection• 7分钟
- Disk Encryption• 6分钟
- Heather: Self-learning is the key to success• 1分钟
- Software Patch Management• 6分钟
- Application Policies• 4分钟
6篇阅读材料• 总计28分钟
- Supplemental Reading for Logging and Auditing• 4分钟
- Windows Defender Guide• 8分钟
- Supplemental Readings for Antimalware Protection• 4分钟
- Supplemental Reading for Disk Encryption• 4分钟
- Browser Hardening• 4分钟
- Glossary terms from course 5, module 5• 4分钟
3个作业• 总计64分钟
- Test your knowledge: System Hardening• 20分钟
- Test your knowledge: Application Hardening• 4分钟
- Module 5 challenge: Defense in Depth• 40分钟
Congratulations, you've made it to the final module in the course! In the last module of this course, we'll explore ways to create a company culture for security. It's important for any tech role to determine appropriate measures to meet the three goals of security. By the end of this module, you will develop a security plan for an organization to demonstrate the skills you've learned in this course. You're almost done, keep up the great work!
涵盖的内容
14个视频9篇阅读材料5个作业
14个视频• 总计53分钟
- Security Goals• 7分钟
- Measuring and Assessing Risk• 5分钟
- Privacy Policy• 4分钟
- User Habits• 6分钟
- Third-Party Security• 4分钟
- Security Training• 3分钟
- Alex: Qualities of an IT candidate• 2分钟
- Incident Reporting and Analysis• 7分钟
- Incident Response and Recovery• 6分钟
- Mobile Security and Privacy• 4分钟
- Amir: Tips for interviews • 1分钟
- Ari: Tips for interviews• 2分钟
- Interview Role Play: Security• 4分钟
- Final Assessment• 0分钟
9篇阅读材料• 总计34分钟
- Supplemental Reading for Risk in the Workplace• 1分钟
- Data Destruction• 4分钟
- Supplemental Reading for User Habits• 1分钟
- Supplemental Reading for Vendor Security Assessment Questionnaires• 4分钟
- Incident Response• 4分钟
- Supplemental Readings for Mobile Security and Privacy• 4分钟
- Bring Your Own Device• 4分钟
- Final Project - Sample Submission• 8分钟
- Glossary terms from course 5, module 6• 4分钟
5个作业• 总计103分钟
- Test your knowledge: Risk in the Workplace• 10分钟
- Test your knowledge: Users• 4分钟
- Test your knowledge: Incident Handling• 4分钟
- Module 6 challenge: Creating a Company Culture for Security• 55分钟
- Creating a Company Culture for Security - Design Document• 30分钟
In the last module of this program, you will learn about ways to use AI to help streamline many common IT tasks and workflows, including troubleshooting, communicating technical concepts, automating routine tasks, simplifying documentation, and identifying security risks.
涵盖的内容
9个视频8篇阅读材料1个作业1个插件
9个视频• 总计28分钟
- Nathalia: Driving impact with AI in the workplace• 3分钟
- Boost your IT Support skills with AI• 5分钟
- Leverage AI for faster troubleshooting• 4分钟
- Communicate technical concepts with AI• 2分钟
- Automate routine tasks with AI• 5分钟
- Simplify IT documentation using AI• 4分钟
- Use AI to identify IT security risks• 3分钟
- Introducing Google AI Essentials• 1分钟
- Congratulations!• 1分钟
8篇阅读材料• 总计50分钟
- Introduction to AI for IT Support• 8分钟
- Use generative AI to work smarter and faster• 8分钟
- Key takeaways for AI in IT Support• 8分钟
- Take the next step with Google AI Essentials • 8分钟
- How to Add Google IT Support Certificate to Your Resume and LinkedIn Profile• 8分钟
- Course 5 Glossary• 2分钟
- Information and FAQs about badges• 4分钟
- Resources for Google IT Support Certificate graduates• 4分钟
1个作业• 总计45分钟
- Activity: Use generative AI to write a message to users• 45分钟
1个插件• 总计10分钟
- Google IT Cert Participant Exit Survey• 10分钟
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
位教师
授课教师评分
我们要求所有学生根据授课教师的教学风格和质量提供对授课教师的反馈。

提供方

提供方

Grow with Google is an initiative that draws on Google's decades-long history of building products, platforms, and services that help people and businesses grow. We aim to help everyone – those who make up the workforce of today and the students who will drive the workforce of tomorrow – access the best of Google’s training and tools to grow their skills, careers, and businesses.
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
学生评论
25,960 条评论
- 5 stars
84.85%
- 4 stars
12.43%
- 3 stars
1.89%
- 2 stars
0.42%
- 1 star
0.39%
显示 3/25960 个
已于 Sep 27, 2019审阅
Fue muy interesante eme encanto, pude aprender muchas cosas que no sabia y todo esto va ser muy util para todos los trabajos que encuentre de ahora en adelante, gracias cousera. Gracias Google
已于 Apr 11, 2020审阅
Personally, I found this course more dense than the previous courses. I would have liked to have seen more visual descriptions of the topics, e.g. cryptography. But other than that, great course :)
已于 Aug 21, 2019审阅
A more in-depth concept can be included in the course and provide a reference to open source tools/technologies so young and aspiring security professionals can gain more out of this course.
常见问题
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
