by Faustina Maria

Categories

Verify certification

Link to the Course:
https://www.coursera.org/learn/it-security/

Learning Objectives

Week 1

  • Define and recognize security risks, vulnerabilities, and threats.
  • Be able to identify the most common security attacks.
  • Understand how security revolves around the CIA principle.

Week 2

  • Understand how symmetric encryption, asymmetric encryption, and hashing work.
  • Describe the most common algorithms of cryptography.
  • Choose the most appropriate cryptographic method given a scenario.

Week 3

  • Identify and describe the most common authentication services.
  • Understand and be able to choose the most appropriate method of authentication or authorization.
  • Be able to grant the appropriate level of access for the users of an organization.

Week 4

  • Implement security measures on a network environment.
  • Understand the risks of wireless networks and how to mitigate them.
  • Understand how to monitor network traffic and read packet captures.

Week 5

  • Implement the appropriate methods for system hardening.
  • Implement the appropriate methods for application hardening.
  • Determine the appropriate policies to use for operating system security.

Week 6

  • Determine appropriate measures to use to meet the 3 goals of security.
  • Develop a security plan for a small-medium size organization.
  • Develop a disaster recovery plan.

About this Course: This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wi-Fi encryption options. Finally, we’ll go through a case study, where we examine the security model of Chrome OS. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.

At the end of this course, you’ll understand:

  • how various encryption algorithms and techniques work as well as their benefits and limitations.
  • various authentication systems and types.
  • the difference between authentication and authorization.
  • how to evaluate potential risks and recommend ways to reduce risk.
  • best practices for securing a network.
  • how to help others to grasp security concepts and protect themselves.