Google
IT Security: Defense against the digital dark arts
Google

IT Security: Defense against the digital dark arts

Google Career Certificates

Top Instructor

Sponsored by Mojatu Foundation

435,023 already enrolled

Gain insight into a topic and learn the fundamentals.
4.8

(23,669 reviews)

Beginner level
No prior experience required
Flexible schedule
Approx. 35 hours
Learn at your own pace
97%
Most learners liked this course
Gain insight into a topic and learn the fundamentals.
4.8

(23,669 reviews)

Beginner level
No prior experience required
Flexible schedule
Approx. 35 hours
Learn at your own pace
97%
Most learners liked this course

Details to know

Shareable certificate

Add to your LinkedIn profile

Assessments

29 quizzes, 3 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

Placeholder

Build your Security expertise

This course is part of the Google IT Support Professional Certificate
When you enroll in this course, you'll also be enrolled in this Professional Certificate.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate from Google
Placeholder
Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

There are 7 modules in this course

Welcome to the IT Security course of the IT Support Professional Certificate! In the first module of this course, we will cover the basics of security in an IT environment. We will learn how to define and recognize security risks, vulnerabilities and threats. We'll identify the most common security attacks in an organization and understand how security revolves around the "CIA" principle. By the end of this module, you will know the types of malicious software, network attacks, client-side attacks, and the essential security terms you'll see in the workplace.

What's included

10 videos8 readings4 quizzes

In the second module of this course, we'll learn about cryptology. We'll explore different types of encryption practices and how they work. We'll show you the most common algorithms used in cryptography and how they've evolved over time. By the end of this module, you'll understand how symmetric encryption, asymmetric encryption, and hashing work; you'll also know how to choose the most appropriate cryptographic method for a scenario you may see in the workplace.

What's included

16 videos12 readings5 quizzes1 assignment2 app items

In the third module of this course, we'll learn about the "three A's" in cybersecurity. No matter what type of tech role you're in, it's important to understand how authentication, authorization, and accounting work within an organization. By the end of this module, you'll be able to choose the most appropriate method of authentication, authorization, and level of access granted for users in an organization.

What's included

14 videos5 readings3 quizzes

In the fourth module of this course, we'll learn about secure network architecture. It's important to know how to implement security measures on a network environment, so we'll show you some of the best practices to protect an organization's network. We'll learn about some of the risks of wireless networks and how to mitigate them. We'll also cover ways to monitor network traffic and read packet captures. By the end of this module, you'll understand how VPNs, proxies and reverse proxies work; why 802.1X is a super important for network protection; understand why WPA/WPA2 is better than WEP; and know how to use tcpdump to capture and analyze packets on a network. That's a lot of information, but well worth it for an IT Support Specialist to understand!

What's included

12 videos11 readings4 quizzes1 assignment1 app item

In the fifth module of this course, we're going to go more in-depth into security defense. We'll cover ways to implement methods for system hardening, application hardening, and determine the policies for OS security. By the end of this module, you'll know why it's important to disable unnecessary components of a system, learn about host-based firewalls, setup anti-malware protection, implement disk encryption, and configure software patch management and application policies.

What's included

9 videos6 readings3 quizzes

Congratulations, you've made it to the final module in the course! In the last module of this course, we'll explore ways to create a company culture for security. It's important for any tech role to determine appropriate measures to meet the three goals of security. By the end of this module, you will develop a security plan for an organization to demonstrate the skills you've learned in this course. You're almost done, keep up the great work!

What's included

24 videos18 readings6 quizzes1 assignment1 plugin

You will engage in a series of interactive activities based on concepts you’ve explored and skills you’ve gained throughout the program. You’ll also explore job readiness skills, develop your resume, and practice interviewing for jobs.

What's included

1 video20 readings4 quizzes

Instructor

Instructor ratings
4.8 (5,480 ratings)
Google Career Certificates

Top Instructor

Google
325 Courses11,277,615 learners

Offered by

Google

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

Learner reviews

4.8

23,669 reviews

  • 5 stars

    84.54%

  • 4 stars

    12.64%

  • 3 stars

    1.91%

  • 2 stars

    0.43%

  • 1 star

    0.45%

Showing 3 of 23669

SG
5

Reviewed on Nov 24, 2021

DT
5

Reviewed on Aug 16, 2023

DS
5

Reviewed on Apr 25, 2018

Recommended if you're interested in Information Technology

Placeholder

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy