Up next

Intro to Defense in Depth

14 Views· 19 Aug 2019
ITCOURSES
ITCOURSES
5 subscribers
0

Google IT Support Professional Certificate
Course 6 - IT Security: Defense against the digital dark arts, Module 5 - Defense in Depth

To get certificate subscribe at: https://www.coursera.org/speci....alizations/google-it
=================
The whole course playlist: Google IT Support Professional Certificate https://www.youtube.com/playli....st?list=PL2jykFOD1AW
=================
IT Security
https://www.youtube.com/playli....st?list=PL2jykFOD1AW
=================
https://www.facebook.com/cyberassociation/
https://scsa.ge/en/online-courses/

This six-course certificate, developed exclusively by Google, includes innovative curriculum designed to prepare you for an entry-level role in IT support. A job in IT can mean in-person or remote help desk work, either in a small business or at a global company, like Google. Whether you’ve been tinkering with IT or are completely new to the field, you’ve come to the right place.
If you’re looking for a job, upon completion of the certificate, you can share your information with top employers, like Bank of America, Walmart, Sprint, GE Digital, PNC Bank, Infosys, TEKsystems, UPMC, and, of course, Google.

Course 6 - IT Security: Defense against the digital dark arts
About the Course
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: Authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team. At the end of this course, you’ll understand: - how various encryption algorithms and techniques work and their benefits and limitations. - various authentication systems and types. - the difference between authentication and authorization. At the end of this course, you’ll be able to: - evaluate potential risks and recommend ways to reduce risk. - make recommendations on how best to secure a network. - help others to understand security concepts and protect themselves

Who is this class for: This program is intended for beginners who are interested in developing the skills necessary to perform entry-level IT support. No pre-requisite knowledge is required. However, if you do have some familiarity with IT, you can skip through any content that you might already know and speed ahead to the graded assessments.

Module 5 - Defense in Depth

In the fifth module of this course, we're going to go more in-depth into security defense. We'll cover ways to implement methods for system hardening, application hardening, and determine the policies for OS security. By the end of this module, you'll know why it's important to disable unnecessary components of a system, learn about host-based firewalls, setup anti-malware protection, implement disk encryption, and configure software patch management and application policies.
Learning Objectives
• Implement the appropriate methods for system hardening.
• Implement the appropriate methods for application hardening.
• Determine the appropriate policies to use for operating system security.

Show more
100% online learning from the world's best universities, organisations and Instructors

 0 Comments sort   Sort By


Up next