課程信息
4.8
2,448 個評分
392 個審閱

100% 在線

立即開始,按照自己的計劃學習。

可靈活調整截止日期

根據您的日程表重置截止日期。

初級

完成時間大約為19 小時

建議:10 hours/week...

英語(English)

字幕:英語(English), 巴西葡萄牙語, 阿拉伯語(Arabic)

您將獲得的技能

CybersecurityWireless SecurityCryptographyNetwork Security

100% 在線

立即開始,按照自己的計劃學習。

可靈活調整截止日期

根據您的日程表重置截止日期。

初級

完成時間大約為19 小時

建議:10 hours/week...

英語(English)

字幕:英語(English), 巴西葡萄牙語, 阿拉伯語(Arabic)

教學大綱 - 您將從這門課程中學到什麼

1
完成時間為 3 小時

Understanding Security Threats

Welcome to the IT Security course of the IT Support Professional Certificate! In the first week of this course, we will cover the basics of security in an IT environment. We will learn how to define and recognize security risks, vulnerabilities and threats. We'll identify the most common security attacks in an organization and understand how security revolves around the "CIA" principle. By the end of this module, you will know the types of malicious software, network attacks, client-side attacks, and the essential security terms you'll see in the workplace. ...
10 個視頻 (總計 36 分鐘), 7 個閱讀材料, 4 個測驗
10 個視頻
The CIA Triad2分鐘
Essential Security Terms4分鐘
Malicious Software5分鐘
Malware Continued2分鐘
Network Attacks3分鐘
Denial-of-Service3分鐘
Client-Side Attacks2分鐘
Password Attacks2分鐘
Deceptive Attacks3分鐘
7 個閱讀材料
Navigating Coursera10分鐘
Program Surveys10分鐘
How to Use Discussion Forums10分鐘
Get to Know Your Classmates10分鐘
Supplemental Reading for Malicious Software10分鐘
Supplemental Reading for Network Attacks10分鐘
Supplemental Reading for DDoS Attacks10分鐘
4 個練習
Malicious Software14分鐘
Network Attacks8分鐘
Other Attacks6分鐘
Understanding Security Threats26分鐘
2
完成時間為 6 小時

Pelcgbybtl (Cryptology)

In the second week of this course, we'll learn about cryptology. We'll explore different types of encryption practices and how they work. We'll show you the most common algorithms used in cryptography and how they've evolved over time. By the end of this module, you'll understand how symmetric encryption, asymmetric encryption, and hashing work; you'll also know how to choose the most appropriate cryptographic method for a scenario you may see in the workplace. ...
14 個視頻 (總計 87 分鐘), 9 個閱讀材料, 7 個測驗
14 個視頻
Symmetric Cryptography5分鐘
Symmetric Encryption Algorithms9分鐘
Rob What a Security Engineer Does1分鐘
Asymmetric Cryptography7分鐘
Asymmetric Encryption Algorithms5分鐘
Hashing3分鐘
Hashing Algorithms5分鐘
Hashing Algorithms (continued)5分鐘
Public Key Infrastructure9分鐘
Cryptography in Action8分鐘
Securing Network Traffic6分鐘
Cryptographic Hardware6分鐘
Instructions for Accessing Linux Qwiklabs5分鐘
9 個閱讀材料
Supplemental Reading for The Future of Cryptanalysis10分鐘
Supplemental Reading for Symmetric Encryptions10分鐘
Supplemental Reading for Asymmetric Encryption Attack10分鐘
Supplemental Reading for SHA1 Attacks10分鐘
Supplemental Reading for the X.509 Standard10分鐘
Supplemental Reading for PGP10分鐘
Supplemental Reading for Securing Network Traffic10分鐘
Supplemental Reading for TPM Attacks10分鐘
Instructions for Accessing Qwiklabs10分鐘
5 個練習
Symmetric Encryption10分鐘
Public Key or Asymmetric Encryption6分鐘
Hashing8分鐘
Cryptography Applications6分鐘
Week Two Practice Quiz28分鐘
3
完成時間為 2 小時

AAA Security (Not Roadside Assistance)

In the third week of this course, we'll learn about the "three A's" in cybersecurity. No matter what type of tech role you're in, it's important to understand how authentication, authorization, and accounting work within an organization. By the end of this module, you'll be able to choose the most appropriate method of authentication, authorization, and level of access granted for users in an organization....
14 個視頻 (總計 55 分鐘), 2 個閱讀材料, 3 個測驗
14 個視頻
Multifactor Authentication12分鐘
Certificates3分鐘
LDAP3分鐘
RADIUS1分鐘
Kerberos7分鐘
TACACS+1分鐘
Single Sign-On3分鐘
Rob Path to IT1分鐘
Authorization and Access Control Methods1分鐘
Access Control5分鐘
Access Control List1分鐘
Tracking Usage and Access3分鐘
Rob Important Skills in Security1分鐘
2 個閱讀材料
Supplemental Reading for Authentication10分鐘
Supplemental Reading for Authorization10分鐘
3 個練習
Authentication26分鐘
Authorization and Accounting6分鐘
AAA Security (Not Roadside Assistance)22分鐘
4
完成時間為 4 小時

Securing Your Networks

In the fourth week of this course, we'll learn about secure network architecture. It's important to know how to implement security measures on a network environment, so we'll show you some of the best practices to protect an organization's network. We'll learn about some of the risks of wireless networks and how to mitigate them. We'll also cover ways to monitor network traffic and read packet captures. By the end of this module, you'll understand how VPNs, proxies and reverse proxies work; why 802.1X is a super important for network protection; understand why WPA/WPA2 is better than WEP; and know how to use tcpdump to capture and analyze packets on a network. That's a lot of information, but well worth it for an IT Support Specialist to understand! ...
11 個視頻 (總計 70 分鐘), 7 個閱讀材料, 5 個測驗
11 個視頻
Network Hardware Hardening9分鐘
Network Software Hardening5分鐘
Joe Personal Obstacle44
WEP Encryption and Why You Shouldn't Use It8分鐘
Let's Get Rid of WEP! WPA/WPA214分鐘
Wireless Hardening3分鐘
Heather Social Engineering1分鐘
Sniffing the Network5分鐘
Wireshark and tcpdump6分鐘
Intrusion Detection/Prevention Systems6分鐘
7 個閱讀材料
Supplemental Reading for Network Hardening Best Practices10分鐘
Supplemental Reading on IEEE 802.1X10分鐘
Supplementary reading on HAProxy, nginx and Apache HTTP server10分鐘
Supplementary reading for WEP Encryption and Why You Shouldn't Use It10分鐘
Supplementary reading on WiFi Protected Setup (WPS) PIN brute force vulnerability10分鐘
Supplemental Reading for Promiscuous Mode10分鐘
Supplemental reading for Intrusion Detection/Prevention System10分鐘
4 個練習
Secure Network Architecture14分鐘
Wireless Security8分鐘
Network Monitoring10分鐘
Week Four Practice Quiz34分鐘
5
完成時間為 2 小時

Defense in Depth

In the fifth week of this course, we're going to go more in-depth into security defense. We'll cover ways to implement methods for system hardening, application hardening, and determine the policies for OS security. By the end of this module, you'll know why it's important to disable unnecessary components of a system, learn about host-based firewalls, setup anti-malware protection, implement disk encryption, and configure software patch management and application policies. ...
12 個視頻 (總計 54 分鐘), 3 個閱讀材料, 4 個測驗
12 個視頻
Disabling Unnecessary Components4分鐘
Host-Based Firewall4分鐘
Logging and Auditing7分鐘
Antimalware Protection7分鐘
Disk Encryption6分鐘
Heather Self Learning1分鐘
Software Patch Management6分鐘
Application Policies4分鐘
The Security Principles of Chrome OS3分鐘
Chrome OS Verified Boot3分鐘
Chrome OS Data Encryption2分鐘
3 個閱讀材料
Supplemental Reading for Logging and Auditing10分鐘
Supplemental Readings for Antimalware Protection10分鐘
Supplemental Reading for Disk Ecryption10分鐘
4 個練習
System Hardening20分鐘
Application Hardening4分鐘
Defense in Depth16分鐘
Formative Quiz - Chrome OS
6
完成時間為 4 小時

Creating a Company Culture for Security

Congratulations, you've made it to the final week in the course! In the last week of this course, we'll explore ways to create a company culture for security. It's important for any tech role to determine appropriate measures to meet the three goals of security. By the end of this module, you will develop a security plan for an organization to demonstrate the skills you've learned in this course. You're almost done, keep up the great work! ...
14 個視頻 (總計 54 分鐘), 4 個閱讀材料, 5 個測驗
14 個視頻
Measuring and Assessing Risk5分鐘
Privacy Policy3分鐘
User Habits6分鐘
Third-Party Security4分鐘
Security Training3分鐘
Alex Grit Story1分鐘
Incident Reporting and Analysis6分鐘
Incident Response and Recovery6分鐘
Interview Role Play: Security4分鐘
Amir Interview1分鐘
Ari Interview1分鐘
Final Assessment32
Congratulations!51
4 個閱讀材料
Supplemental Reading for Risk in the Workplace10分鐘
Supplemental Reading for User Habits10分鐘
Supplemental Reading for Vendor Security Assessment Questionnaires10分鐘
Final Project - Sample Submission10分鐘
4 個練習
Risk in the Workplace10分鐘
Users4分鐘
Incident Handling4分鐘
Creating a Company Culture for Security22分鐘
4.8
392 個審閱Chevron Right

熱門審閱

創建者 DSApr 26th 2018

Great course that is full of useful information and presented in an easy to understand way. It's an awesome beginner course that will add to your knowledge and further your knowledge of IT security.

創建者 DSAug 17th 2018

This course was insane, all the possibilities, the potential for growth, and the different ways to help protect against cyber attacks. It was truly an eye-opening lesson in security. Thank you.

講師

關於 Google

The IT Support Professional Certificate program is part of Grow with Google, an initiative that draws on Google's 20-year history of building products, platforms, and services that help people and businesses grow. Through programs like these, we aim to help everyone– those who make up the workforce of today and the students who will drive the workforce of tomorrow – access the best of Google’s training and tools to grow their skills, careers, and businesses....

關於 Google IT 支持专业认证课程 專項課程

This five-course certificate, developed by Google, includes innovative curriculum designed to prepare you for an entry-level role in IT support. A job in IT can mean in-person or remote help desk work in a small business or at a global company like Google. If you’ve been tinkering with IT or are new to the field, you’re at the right place. The program is part of Grow with Google, a Google initiative to help create economic opportunities for all Americans. Check out this video to learn more. Upon completion of the certificate, you can share your information with top employers like Cognizant, GE Digital, H&R Block, Hulu, J.M. Smucker, Infosys, Intel, KForce, MCPc, PNC Bank, RICOH USA, Sprint, TEKSystems, UPMC, Veterans United Home Loans, Walmart and their subsidiaries, and of course, Google. Through a mix of video lectures, quizzes, and hand-on labs and widgets, the program will introduce you to troubleshooting and customer service, networking, operating systems, system administration and security. Along the way, you’ll hear from Googlers with unique backgrounds whose own foundation in IT support served as a jumping off point for their careers. By dedicating 8-10 hours a week, you can complete the certificate in about eight months. You can skip through content that you might already know and speed ahead to the graded assessments. The content in the Google IT Support Professional Certificate is licensed under a Creative Commons Attribution 4.0 International License....
Google IT 支持专业认证课程

常見問題

  • 注册以便获得证书后,您将有权访问所有视频、测验和编程作业(如果适用)。只有在您的班次开课之后,才可以提交和审阅同学互评作业。如果您选择在不购买的情况下浏览课程,可能无法访问某些作业。

  • 您注册课程后,将有权访问证书中的所有课程,并且会在完成作业后获得证书。您的电子证书将添加到您的成就页中,您可以通过该页打印证书或将其添加到您的领英档案中。如果您只想阅读和查看课程内容,可以免费旁听课程。

還有其他問題嗎?請訪問 學生幫助中心