IT Security: Defense against the digital dark arts

BY
Google via Coursera

Learn how IT security works by enrolling for this course by Coursera offered by Google IT Support Professional Certificate.

Lavel

Beginner

Mode

Online

Quick Facts

particular details
Medium of instructions English
Mode of learning Self study
Mode of Delivery Video and Text Based

Course overview

The technological advancements have it's pro`s as well as cons. Nowadays cybercriminals have become more advanced and use sophisticated tools that one cannot even think of and cause devastating effects. To avoid such problems, one needs to rethink their security and amend accordingly for the same.

With the increasing risks of cyberattacks, cyber security needs to be taken care of by each and every business company to avoid digital dark arts. Which would not only prevent disruption of the company's revenue and details but also will help them maintain competitiveness in the industry. Therefore, they will always have to evolve their security with the evolution of technology.

This is a perfect platform to learn about IT security and how to defend against the digital dark arts. Our course is designed in a way which will help the beginners to understand things easily and make it easy for them to grasp knowledge.

The highlights

  • The total duration of Approx. 37 hours
  • Online-based training and learning 
  • Course offering by Google
  • Seven days free trial 
  • Beginner level 

Program offerings

  • Projects
  • Quizzes
  • Readings
  • Assignments.

Course and certificate fees

IT Security: Defense against the digital dark arts Fees Details

Description

Amount in INR

Fee for 1-month

Rs. 1,175

Fee for 3-month

Rs. 2,351

Fee for 6-month

Rs. 3,527


certificate availability

Yes

certificate providing authority

Coursera +1 more

What you will learn

Knowledge of cyber security

On completion of IT Security: Defense against the digital dark arts, the candidates will gain immense learning and knowledge about: 

  • The candidate will understand and learn how different encryption techniques and algorithm works, along with their limitations and benefits
  • They will gain in-depth knowledge about various systems and types of authentication
  • Helping out others by making them understand about various security concepts and teaching them different ways of protecting them.
  • They will get hands-on experience of how to secure network
  • The candidates will easily be able to evaluate potential and recommend ways to reduce risk

The syllabus

Module 1: Understanding Security Threats

Videos
  • Course Introduction
  • The CIA Triad
  • Essential Security Terms
  • Malicious Software
  • Malware Continued
  • Network Attacks
  • Denial-of-Service
  • Client-Side Attacks
  • Password Attacks
  • Deceptive Attacks
Readings
  • Navigating Coursera
  • How to Use Discussion Forums
  • Get to Know Your Classmates
  • Antimalware Protection, Malware Removal
  • Supplemental Reading for Malicious Software
  • Supplemental Reading for Network Attacks
  • Supplemental Reading for DDoS Attacks
  • Deceptive Attacks
  • Physical Security
  • Module 1 Glossary
Quiz
  • Malicious Software
  • Other Attacks
  • Network Attacks
  • Understanding Security Threats

Module 2: Pelcgbybtl (Cryptology)

Videos
  • Cryptography
  • Symmetric Cryptography
  • Symmetric Encryption Algorithms
  • Rob: The work of a security engineer
  • Asymmetric Cryptography
  • Symmetric Cryptography, Part Two
  • Asymmetric Encryption Algorithms
  • Hashing
  • Hashing Algorithms
  • Hashing Algorithms (continued)
  • Public Key Infrastructure
  • Certificates
  • Cryptography in Action
  • Securing Network Traffic
  • Cryptographic Hardware
  • Rejection
Readings
  • Supplemental Reading for The Future of Cryptanalysis
  • Supplemental Reading for Symmetric Encryptions
  • Supplemental Reading for Asymmetric Encryption Attack
  • Supplemental Reading for SHA1 Attacks
  • Supplemental Reading for the X.509 Standard
  • Supplemental Reading for PGP
  • Supplemental Reading for Securing Network Traffic
  • Supplemental Reading for TPM Attacks
  • Module 2 Glossary
  • Qwiklabs Introduction
Quiz
  • Symmetric Encryption
  • Public Key or Asymmetric Encryption
  • Hashing
  • Cryptography Applications
  • Pelcgbybtl (Cryptology)

Module 3: The 3 A's of Cybersecurity: Authentication, Authorization, Accounting

Videos
  • Best practices for authentication
  • Multifactor Authentication
  • Multifactor Authentication Options
  • Certificates, Part Two
  • RADIUS
  • Kerberos
  • TACACS+
  • Single Sign-On
  • Rob: My path to IT
  • Authorization and Access Control Methods
  • Access Control
  • Access Control List
  • Tracking Usage and Access
  • Rob: Important skills in security
Readings
  • Physical Privacy and Security Components
  • Supplemental Reading for Authorization 
  • Mobile Security Methods
  • Supplemental Reading for Authentication
  • Module 3 Glossary
Quiz
  • Authorization and Accounting
  • Authentication
  • Authentication, Authorization, Accounting Quiz  

Module 4: Securing Your Networks

Videos
  • Network Hardening Best Practices
  • Network Hardware Hardening
  • Network Software Hardening
  • Joe: My personal obstacle
  • WEP Encryption and Why You Shouldn't Use It
  • Let's Get Rid of WEP!
  • WPA2
  • Wireless Hardening
  • Heather: The impact of social engineering
  • Sniffing the Network
  • Wireshark and tcpdump
  • Intrusion Detection/Prevention Systems
Readings
  • Supplemental Reading for Network Hardening Best Practices
  • Supplemental Reading on IEEE 802.1X
  • Supplementary reading on HAProxy, nginx and Apache HTTP server
  • Supplementary reading for WEP Encryption and Why You Shouldn't Use It
  • Supplementary reading on WiFi Protected Setup (WPS) PIN brute force vulnerability
  • Supplemental Reading for Promiscuous Model
  • Supplemental reading for Intrusion Detection/Prevention System
  • Unified Threat Management (UTM) 
  • Home Network Security
  • Module 4 Glossary
Quiz
  • Secure Network Architecture
  • Wireless Security
  • Network Monitoring
  • Securing Your Networks

Module 5: Defense in Depth

Videos
  • Intro to Defense in Depth
  • Disabling Unnecessary Components
  • Host-Based Firewall
  • Logging and Auditing
  • Antimalware Protection
  • Disk Encryption
  • Heather: Self-learning is the key to success
  • Software Patch Management
  • Application Policies
Readings
  • Supplemental Reading for Logging and Auditing
  • Windows Defender Guide
  • Supplemental Readings for Antimalware Protection
  • Supplemental Reading for Disk Encryption
  • Browser Hardening
  • Module 5 Glossary
Quiz
  • System Hardening
  • Application Hardening
  • Defense in Depth

Module 6: Creating a Company Culture for Security

Videos
  • Security Goals
  • Measuring and Assessing Risk
  • Privacy Policy
  • User Habits
  • Third-Party Security
  • Security Training
  • Alex: Qualities of an IT candidate
  • Incident Reporting and Analysis
  • Incident Response and Recovery
  • Mobile Security and Privacy
  • Amir: Tips for interviews
  • Ari: Tips for interviews
  • Interview Role Play: Security
  • Final Assessment
  • Framing yourself
  • Congratulations!
Readings
  • Supplemental Reading for Risk in the Workplace
  • Data Destruction
  • Supplemental Reading for User Habits
  • Supplemental Reading for Vendor Security Assessment Questionnaires
  • Incident Response
  • Supplemental Readings for Mobile Security and Privacy
  • Bring Your Own Device
  • Invitation to Sign Up for Big Interview
  • Final Project - Sample Submission
  • How to Add Google IT Support Certificate to Your Resume and LinkedIn Profile
  • Common Job Search Terms
  • Module 6 Glossary
  • Course 5 Glossary
  • Information and FAQs about badges
Quiz
  • Risk in the Workplace
  • Users
  • Incident Handling
  • Creating a Company Culture for Security
  • Creating a Company Culture for Security - Design Document
  • Your Access to Google Job Search Resources

Module 7: Prepare for Jobs in IT Support

Readings
  • Tailoring your Resume for IT Support
  • Finding your Path and Perfect Role
  • Personal Branding
  • Recruiters, Headhunters and Staffing Agencies
  • Write a Cover Letter 
  • Getting Started with LinkedIn
  • How to get Interviews
  • Learn More About Developing an Elevator Pitch
  • Ask the Interviewer Questions1
  • Prepare for Interviews with Interview Warmup
  • Before you Accept, Negotiating the Contract
  • Imposter Syndrome
  • Working from Home for the Win (WFH FTW)
  • Burnout
  • Create a Career Development Plan
  • Getting Promoted
  • Related Technical Careers
  • Social Emotional Skills
  • Diversity, Inclusion, and Bias
  • Advanced Communication Skills
Quiz
  • Hands-on Activity: Adding Skills and Experience to your Resume
  • Self Review - Build a Job Search Project Plan
  • Create Questions to Ask your Interviewer
  • Self-review: Practice Using the STAR Method to Answer Interview Questions 

Admission details


Filling the form

There is a set of process to be followed in order to get IT Security: Defense against the digital dark arts admission:

Step 1: To register for this programme, the candidate needs to first go to the official webpage of the programme.

Step 2: There will be a tab ‘Enrol Now’. If you click it, you will first get access to try this programme for free but for 7 days only.

Step 3: Thereafter, sign up via Google or Facebook.

Step 4: Immediately the 7 days free trial will start. Once it is over, candidates will be required to pay fees to access the programme on a monthly basis.

Scholarship Details

If the candidate is unable to pay for the fees, he/she can readily avail financial assistance for the programme from Coursera. To do so, the candidate needs to click on ‘Financial Aid’. Then click on the Enroll Now tab and apply for it.

How it helps

The IT Security: Defense against the digital dark arts certification programme gives immense opportunities for candidates to pursue advanced-level programmes. Developed by experts from industry, the candidates irrespective of coming from a basic level can easily pursue this programme. To make it easy to access, the programme is available in different subtitle languages namely, Arabic, Spanish, English and Portuguese. The knowledge gained throughout the curriculum will enable candidates to later apply it in real life. The certificate which is received post completion of the programme is a shareable one and hence can also be shared via LinkedIn.  This will open more doors of opportunity for the candidate. The recruiters can easily access the information on this certificate and offer higher and better paying job opportunities to the candidates. They can even apply for higher positions in the same company or try to move into parallel companies.

FAQs

Who is going to offer this IT Security: Defense against the digital dark arts programme?

The IT Security: Defense against the digital dark arts programme by Coursera is conducted by Google.

Can I expect any job opportunity or any chance to get a job with the help of Coursera?

Coursera excels in training and preparing the candidates to excel in their professional pathway. They do not facilitate or conduct any programme that helps the candidates in getting the job.

Do I need to meet any age criteria to apply for this programme?

The programme does not have any limitations from an age point of view. You can enrol irrespective of being at any age.

Can I expect the refund of the fee paid in case I do not want to continue the programme?

The programme initially gives a 7-day free trial session for candidates. Post which one needs to make the fee payment to continue. Hence, there is no possibility to get a refund.

What are the technical requirements for the programme?

The IT Security: Defense against the digital dark arts programme has a very basic requirement of a laptop and a Wi-Fi Connection.

Similar Courses

Secure Software Development Requirements Design an...

The Linux Foundation via Edx

7 Weeks Online
Beginner
Free

Secure Software Development Verification and More ...

The Linux Foundation via Edx

7 Weeks Online
Beginner
Free

Secure Software Development Implementation

The Linux Foundation via Edx

7 Weeks Online
Beginner
Free

AWS Fundamentals Addressing Security Risk

Amazon Web Services via Coursera

Online
Beginner
Free

Amazon Web Services Getting Started with Cloud Sec...

Amazon Web Services via Edx

4 Weeks Online
Beginner
Free

Security Operations and Administration

(ISC)² via Coursera

6 Weeks Online
Beginner
₹ 16,796

Courses of your Interest

An Introduction To Coding Theory

An Introduction To Coding Theory

IIT Kanpur via Swayam

8 Weeks Online
Beginner
Free

C++ Foundation

PW Skills

5 Months Online
Beginner
Free

Advanced CFD Meshing using ANSA

Skill Lync

4 Weeks Online
Beginner
₹ 40,000

Salesforce Platform App Builder Certification Trai...

Simplilearn

12 Hours Online
Beginner

Data Science Foundations to Core Bootcamp

Springboard

7 Months Online
Beginner
$9,900 $13,900
Full Stack Developer Course With Placement

Full Stack Developer Course With Placement

AttainU

7 Months Online
Beginner
₹ 68,000
User Experience Design And Research

User Experience Design And Research

UM–Ann Arbor via Futurelearn

35 Weeks Online
Beginner
Fundamentals of Agile Project Management

Fundamentals of Agile Project Management

UCI Irvine via Futurelearn

21 Weeks Online
Beginner
Artificial intelligence Design and Engineering wit...

Artificial intelligence Design and Engineering wit...

CloudSwyft Global Systems, Inc via Futurelearn

17 Weeks Online
Beginner

More Courses by Google

Fundamentals Training

Google

15 Hours Online
Beginner
Free

Google Artificial Intelligence for JavaScript Deve...

Google via Edx

7 Weeks Online
Beginner
Free

Coronavirus Powersearching

Google via Edx

2 Weeks Online
Beginner
Free

Building No Code Apps with App Sheet Foundations

Google via Coursera

Online
Beginner

Introduction to Cloud Identity

Google via Coursera

Online
Beginner
Free

CBRS Professional Training

Google via Coursera

5 Weeks Online
Beginner
₹ 33,528

Contact Center Artificial Intelligence Conversatio...

Google via Coursera

2 Weeks Online
Beginner

Understanding Your Google Cloud Costs

Google via Coursera

3 Weeks Online
Beginner
Free

Developing a Google SRE Culture

Google via Coursera

7 Weeks Online
Beginner

Deploying SAP on Google Cloud

Google via Coursera

8 Weeks Online
Beginner
Free

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books