Akamai Technologies, Inc.
Introduction to IT Security
Akamai Technologies, Inc.

Introduction to IT Security

This course is part of multiple programs.

Shadow Farrell

Instructor: Shadow Farrell

Top Instructor

Sponsored by Southeastern University

2,476 already enrolled

Gain insight into a topic and learn the fundamentals.
4.9

(14 reviews)

Beginner level

Recommended experience

22 hours to complete
3 weeks at 7 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
4.9

(14 reviews)

Beginner level

Recommended experience

22 hours to complete
3 weeks at 7 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Students will learn about security and risk management, IAM, cryptography, vulnerability management, and incident response.

Details to know

Shareable certificate

Add to your LinkedIn profile

Assessments

27 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

Placeholder

Build your subject-matter expertise

This course is available as part of
When you enroll in this course, you'll also be asked to select a specific program.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate from Akamai Technologies, Inc.
Placeholder
Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

There are 9 modules in this course

In this module, you will explore the information security cycle including the concepts of security, risk and the security management process. Then you will leqarn about physical security including the different control types and physical security controls from each type, and addressing environmental exposures.

What's included

11 videos2 readings3 assignments2 discussion prompts

In this module, you will explore authentication in depth including learning about authentication factors, multi-factor and single-factor authentication, and strong passwords. You will learn about account management including multiple and shared accounts, single sign-on and access control.

What's included

8 videos1 reading3 assignments2 discussion prompts

In this module, you will learn about securing endpoints including patch management and application control. You will explore integrating mobile and IoT devices, and the effects of location services.

What's included

7 videos1 reading3 assignments

In this module, you will learn the basics of cryptography including the difference between symmetric and asymmetric encryption, and some of the algorithms. You will learn about hashes and digital certificates and understand the fundamentals of a Public Key Infrastructure.

What's included

11 videos1 reading4 assignments1 discussion prompt

In this module, you will review network components and learn about defense in depth including firewalls and intrusion detection/prevention systems. You will learn about extending the network perimeter including wireless networks, cloud services and remote access.

What's included

10 videos6 readings4 assignments

In this module, you will learn about vulnerability scanning and ethical hacking. You will explore data security, security policies, and gain a deeper understanding of risk. You will also learn about compliance.

What's included

8 videos2 readings3 assignments1 discussion prompt

In this module, you will learn about attackers and attacks. You will learn about the concepts behind social engineering and some of the more common social engineering attacks. You will learn about web attacks, malware, software attacks, wireless attacks and password attacks.

What's included

8 videos1 reading3 assignments1 discussion prompt

In this module, you will learn about how to manage security incidents including prevention techniques. You will gain an understanding of incident response, forensics, business continuity, redundancy, the disaster recovery process, RAID and backups.

What's included

1 video11 readings4 assignments

Students will demonstrate mastery of the material by creating and uploading a capstone project.

What's included

3 videos1 peer review

Instructor

Shadow Farrell

Top Instructor

Akamai Technologies, Inc.
6 Courses24,082 learners

Offered by

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Placeholder

Open new doors with Coursera Plus

Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy