Chevron Left
Back to IT Security: Defense against the digital dark arts

Learner Reviews & Feedback for IT Security: Defense against the digital dark arts by Google

4.8
stars
23,867 ratings

About the Course

This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team. At the end of this course, you’ll understand: ● how various encryption algorithms and techniques work as well as their benefits and limitations. ● various authentication systems and types. ● the difference between authentication and authorization. ● how to evaluate potential risks and recommend ways to reduce risk. ● best practices for securing a network. ● how to help others to grasp security concepts and protect themselves. ● new AI skills from Google experts to help complete IT tasks....

Top reviews

DM

Aug 13, 2023

Course was very knowledgeable and worth taking. I feel like the training wouldn't be complete if I didn't know about security and how important it is not just for me but for everyone using technology!

OA

Jun 30, 2023

Great course for beginners and experts. Easy to understand and a good refresher for those who have been into IT for a long date. Recommend it to everyone looking for a high quality course on coursera.

Filter by:

3701 - 3725 of 3,854 Reviews for IT Security: Defense against the digital dark arts

By sohong d

Apr 9, 2021

nice

By mustofa

Feb 22, 2021

good

By Brian G

Oct 18, 2020

good

By Ajay Y

Aug 18, 2020

good

By ATechSpot

Aug 6, 2020

nice

By MIRZA M Y R

Jul 7, 2020

good

By HASAN, M T

Jun 20, 2020

good

By Sharma M S

May 29, 2020

good

By JOSHI T S

May 21, 2020

good

By THAKUR S R S

May 15, 2020

good

By Arbazkhan k

May 9, 2020

Cool

By Madaminova A X q

Apr 11, 2024

ddd

By SARABIA R S D

Oct 29, 2022

ok

By Rohit R

Feb 1, 2021

...

By Steven T

Nov 9, 2022

ok

By Arthur A

Jun 16, 2022

g

By Sharita G

Jan 29, 2022

By Dayci R

Jan 23, 2022

i

By 7HAKUR

Dec 7, 2021

I

By Tuoyo A

Sep 14, 2021

S

By Narendra V

Aug 15, 2020

h

By Charles J

Oct 20, 2019

-

By DeVaughn H

Mar 26, 2021

I appreciate all who tried their best to make this course, but it just didn't work out for me as well as i wanted. I feel like i didn't retain much information, and that a lot of words and topics were thrown at me so quickly. There were virtually no useful or practical things to do to help us learn hands on either. There were also a lot of things that were not explained properly in depth and that are skimmed over. There are even things mentioned in previous lessons or sections that we don't learn about until much later, but is also glossed over a bit. I dont mean to bash the instructors and the other people behind the scenes who put this together, but at a certain point, i honestly just downloaded the text from the videos to teach myself better. Some videos is someone just reading the text with no prompts or diagrams for 7+ minutes, and videos that have prompts are...almost useless to be honest. I appreciate the attempt at diagrams, but they're not really useful to follow along that much. Anyway, there's more to unpack but my fingers hurt lol. There was some good, like i learned a lot of cool stuff, even tho little portions of the information wasn't useful to my graded quizzes. I hope this course works out for any others that wanna try it. its good to get your feet wet in IT.

By Todd R

Jan 6, 2023

I like the part about how tcp/ip works the most. The security stuff was a bit over my head. I worked with printers years ago and used to see issues with laptops that couldn't print quite often. I read online that Jewish vocational service has a program where they say you need google IT and they can get you a job, but the economy isn't so good anymore, so that may no longer be true. I used to fix printers at work for 12 years and occasionally diagnose a bad laptop for IT. Maybe it's beyond the technology, but they need to put a bad pc in front of the students online and tell us the problem , so we can diagnose it. I used to see corrupt operating systems that stopped printing, laptops not getting required updates and extremely slow pcs with full hard drives. They need examples of broken pcs. I even saw a pc that spat out gibberish on startup. The bios on the motherboard was corrupted somehow.

By Manuel S

May 31, 2020

-Not very well structured; probably you could categorize better the topics of weeks 5 and 6. For example, the steps of incident handling are not very clearly differentiated: I assume they are detection, contention, correction, and testing... but I could also set analysis and recovery as separate steps.

-Some topics include too much in-depth information, like different forms of authentication, making it difficult to discriminate important information and technical details. Also, the way they are presented makes difficult to differentiate which of them are intended for authn., for authz. or for both.

-Final project evaluation was disappointing. I spent several days working and researching just to find out that I could had input "lorem ipsum" in the textbox to get approved. I expected some specific feedback or peer reviews like in other courses.