Up next

Authentication Best Practices

12 Views· 19 Aug 2019
ITCOURSES
ITCOURSES
5 subscribers
0

Google IT Support Professional Certificate
Course 6 - IT Security: Defense against the digital dark arts, Module 3 - AAA Security (Not Roadside Assistance)

To get certificate subscribe at: https://www.coursera.org/speci....alizations/google-it
=================
The whole course playlist: Google IT Support Professional Certificate https://www.youtube.com/playli....st?list=PL2jykFOD1AW
=================
IT Security
https://www.youtube.com/playli....st?list=PL2jykFOD1AW
=================
https://www.facebook.com/cyberassociation/
https://scsa.ge/en/online-courses/

This six-course certificate, developed exclusively by Google, includes innovative curriculum designed to prepare you for an entry-level role in IT support. A job in IT can mean in-person or remote help desk work, either in a small business or at a global company, like Google. Whether you’ve been tinkering with IT or are completely new to the field, you’ve come to the right place.
If you’re looking for a job, upon completion of the certificate, you can share your information with top employers, like Bank of America, Walmart, Sprint, GE Digital, PNC Bank, Infosys, TEKsystems, UPMC, and, of course, Google.

Course 6 - IT Security: Defense against the digital dark arts
About the Course
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: Authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team. At the end of this course, you’ll understand: - how various encryption algorithms and techniques work and their benefits and limitations. - various authentication systems and types. - the difference between authentication and authorization. At the end of this course, you’ll be able to: - evaluate potential risks and recommend ways to reduce risk. - make recommendations on how best to secure a network. - help others to understand security concepts and protect themselves

Who is this class for: This program is intended for beginners who are interested in developing the skills necessary to perform entry-level IT support. No pre-requisite knowledge is required. However, if you do have some familiarity with IT, you can skip through any content that you might already know and speed ahead to the graded assessments.

Module 3 - AAA Security (Not Roadside Assistance)

In the third module of this course, we'll learn about the "three A's" in cybersecurity. No matter what type of tech role you're in, it's important to understand how authentication, authorization, and accounting work within an organization. By the end of this module, you'll be able to choose the most appropriate method of authentication, authorization, and level of access granted for users in an organization.
Learning Objectives
• Identify and describe the most common authentication services.
• Understand and be able to choose the most appropriate method of authentication or authorization.
• Be able to grant the appropriate level of access for the users of an organization.

Show more
100% online learning from the world's best universities, organisations and Instructors

 0 Comments sort   Sort By


Up next