Sale!

IT Security Defense against the digital dark arts

Original price was: $12.00.Current price is: $5.00.

Price: 5.00 USD | Size: 2.00 GB | Duration : 5.15+ Hours
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD

Description

Price: 5.00 USD | Size: 2.00 GB | Duration : 5.15+ Hours
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD
IT Security Defense against the digital dark arts

Build your Security expertise
This course is part of the Google IT Support Professional Certificate
When you enroll in this course, you’ll also be enrolled in this Professional Certificate.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate from Google

There are 7 modules in this course
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.

At the end of this course, you’ll understand:
● how various encryption algorithms and techniques work as well as their benefits and limitations.
● various authentication systems and types.
● the difference between authentication and authorization.
● how to evaluate potential risks and recommend ways to reduce risk.
● best practices for securing a network.
● how to help others to grasp security concepts and protect themselves.

 

Modules

Week 1
1- Introduction to IT Security
2- Malicious Software
3- Network Attacks
4- Other Attacks

Week 2
1- Symmetric Encryption
2- Public Key or Asymmetric Encryption
3- Hashing
4- Cryptography Applications
5- Graded Assessments

Week 3
1- Authentication
2- Authorization
3- Accounting

Week 4
1- Secure Network Architecture
2- Wireless Security
3- Network Monitoring

Week 5
1- System Hardening
2- Application Hardening

Week 6
1- Risk in the Workplace
2- Users
3- Incident Handling
4- Graded Assessments
5- Course Wrap Up

Week 7
1- Create an effective resume and job search strategy
2- Interview for IT support jobs
3- Career development
4- Inclusive workplaces


Discover more from Expert Training

Subscribe to get the latest posts sent to your email.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.