Up next

Cryptographic Hardware

23 Views· 19 Aug 2019
ITCOURSES
ITCOURSES
5 subscribers
0

Google IT Support Professional Certificate
Course 6 - IT Security: Defense against the digital dark arts, Module 2 - Cryptology

To get certificate subscribe at: https://www.coursera.org/speci....alizations/google-it
=================
The whole course playlist: Google IT Support Professional Certificate https://www.youtube.com/playli....st?list=PL2jykFOD1AW
=================
IT Security
https://www.youtube.com/playli....st?list=PL2jykFOD1AW

=================
https://www.facebook.com/cyberassociation/
https://scsa.ge/en/online-courses/

This six-course certificate, developed exclusively by Google, includes innovative curriculum designed to prepare you for an entry-level role in IT support. A job in IT can mean in-person or remote help desk work, either in a small business or at a global company, like Google. Whether you’ve been tinkering with IT or are completely new to the field, you’ve come to the right place.
If you’re looking for a job, upon completion of the certificate, you can share your information with top employers, like Bank of America, Walmart, Sprint, GE Digital, PNC Bank, Infosys, TEKsystems, UPMC, and, of course, Google.

Course 6 - IT Security: Defense against the digital dark arts
About the Course
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: Authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team. At the end of this course, you’ll understand: - how various encryption algorithms and techniques work and their benefits and limitations. - various authentication systems and types. - the difference between authentication and authorization. At the end of this course, you’ll be able to: - evaluate potential risks and recommend ways to reduce risk. - make recommendations on how best to secure a network. - help others to understand security concepts and protect themselves

Who is this class for: This program is intended for beginners who are interested in developing the skills necessary to perform entry-level IT support. No pre-requisite knowledge is required. However, if you do have some familiarity with IT, you can skip through any content that you might already know and speed ahead to the graded assessments.

Module 2 - Cryptology

In the second module of this course, we'll learn about cryptology. We'll explore different types of encryption practices and how they work. We'll show you the most common algorithms used in cryptography and how they've evolved over time. By the end of this module, you'll understand how symmetric encryption, asymmetric encryption, and hashing work; you'll also know how to choose the most appropriate cryptographic method for a scenario you may see in the workplace.

Learning Objectives
• Understand the how symmetric encryption, asymmetric encryption, and hashing work.
• Describe the most common algorithms of cryptography.
• Choose the most appropriate cryptographic method given a scenario.

Show more
100% online learning from the world's best universities, organisations and Instructors

 0 Comments sort   Sort By


Up next