Chevron Left
返回到 IT Security: Defense against the digital dark arts

学生对 Google 提供的 IT Security: Defense against the digital dark arts 的评价和反馈

4.8
25,790 个评分

课程概述

This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team. At the end of this course, you’ll understand: ● how various encryption algorithms and techniques work as well as their benefits and limitations. ● various authentication systems and types. ● the difference between authentication and authorization. ● how to evaluate potential risks and recommend ways to reduce risk. ● best practices for securing a network. ● how to help others to grasp security concepts and protect themselves. ● new AI skills from Google experts to help complete IT tasks....

热门审阅

DM

Aug 13, 2023

Course was very knowledgeable and worth taking. I feel like the training wouldn't be complete if I didn't know about security and how important it is not just for me but for everyone using technology!

DS

Apr 25, 2018

Great course that is full of useful information and presented in an easy to understand way. It's an awesome beginner course that will add to your knowledge and further your knowledge of IT security.

筛选依据:

1126 - IT Security: Defense against the digital dark arts 的 1150 个评论(共 4,281 个)

创建者 JKLim

Jan 5, 2020

This course is really awesome to underscyber security overall

创建者 Christopher B

Sep 11, 2019

Great course! Provides some great insight into cybersecurity.

创建者 Martin Z

Sep 6, 2019

very useful and have a lot of new idea for the defense system

创建者 Jose L J

Apr 6, 2019

It's almost the best course of the certification. I love it!!

创建者 Christopher B

Feb 7, 2019

Hardest one yet! Take your time on the final project, though!

创建者 Belew W

Dec 4, 2018

A course that everyone in the digital world needs to know it.

创建者 Andres Q

Sep 13, 2025

Muy completo y aprende nuevos temas de las cuales desconocía

创建者 Doris L

Nov 18, 2024

Super! Ich habe viel gelernt und es hat Spaß gemacht! Danke!

创建者 G Z

Jul 16, 2024

great course and very useful information if you are begginer

创建者 Benjamin G

Apr 10, 2024

This course is an amazing way to get started in the IT world

创建者 Daniel A

Jul 7, 2023

this course on it security is well delivered and structured.

创建者 Antonia J O

Apr 8, 2023

This was the best part of this Course. I enjoyed this 1000%

创建者 Denise B

Mar 8, 2022

Great! Difficult but possible! Take it, you won`t be regret!

创建者 Yuliya K

Jan 4, 2022

Very systematic approach in explaining security architecture

创建者 Martin W

Nov 19, 2021

Really enjoyed all of the courses and the Instructors 10/10

创建者 Gourav

Mar 28, 2021

It was great to learn something new and enhance my skillset.

创建者 Deleted A

Dec 29, 2020

Great and Fun Course. It widens my knowledge in IT Security.

创建者 Patrick C G

Jul 18, 2020

Course was WICKED. Orders of MAGNITUDE better than expected.

创建者 KEDARNATH R B

May 1, 2020

best google course !!!! no words ,learn cybersecurity skills

创建者 Francisco R A

Nov 6, 2019

policies and defenses are the most important in this course.

创建者 Michael H

Jul 3, 2019

Excellent overview of defensive practice for cyber security.

创建者 Gonzalo H O F

Dec 2, 2018

Very challenging and rich content training. Than you so much

创建者 Jackson S

Nov 23, 2018

Great overview of IT security, a worthwhile course for sure!

创建者 bc180402245 U H

Jun 19, 2025

very good course because it provides most modern approaches

创建者 Shai G

Sep 1, 2024

excellent introduction to secure a simple IT infrastructure