- Course Introduction
- The CIA Triad
- Essential Security Terms
- Malicious Software
- Malware Continued
- Network Attacks
- Denial-of-Service
- Client-Side Attacks
- Password Attacks
- Deceptive Attacks
Beginner
Online
7 Weeks
Quick facts
particular | details | |
---|---|---|
Medium of instructions
English
|
Mode of learning
Self study
|
Mode of Delivery
Video and Text Based
|
Course overview
The technological advancements have it's pro`s as well as cons. Nowadays cybercriminals have become more advanced and use sophisticated tools that one cannot even think of and cause devastating effects. To avoid such problems, one needs to rethink their security and amend accordingly for the same.
With the increasing risks of cyberattacks, cyber security needs to be taken care of by each and every business company to avoid digital dark arts. Which would not only prevent disruption of the company's revenue and details but also will help them maintain competitiveness in the industry. Therefore, they will always have to evolve their security with the evolution of technology.
This is a perfect platform to learn about IT security and how to defend against the digital dark arts. Our course is designed in a way which will help the beginners to understand things easily and make it easy for them to grasp knowledge.
The highlights
- The total duration of Approx. 31 hours
- Online-based training and learning
- Course offering by Google
- Seven days free trial
- Beginner level
Program offerings
- Projects
- Quizzes
- Readings
- Assignments
Course and certificate fees
IT Security: Defense against the digital dark arts Fees Details
Description | Amount in INR |
Fee for 1-month | Rs. 1,153 |
Fee for 3-month | Rs. 2,307 |
Fee for 6-month | Rs. 3,461 |
certificate availability
certificate providing authority
What you will learn
On completion of IT Security: Defense against the digital dark arts, the candidates will gain immense learning and knowledge about:
- The candidate will understand and learn how different encryption techniques and algorithm works, along with their limitations and benefits
- They will gain in-depth knowledge about various systems and types of authentication
- Helping out others by making them understand about various security concepts and teaching them different ways of protecting them.
- They will get hands-on experience of how to secure network
- The candidates will easily be able to evaluate potential and recommend ways to reduce risk
Admission details
Filling the form
There is a set of process to be followed in order to get IT Security: Defense against the digital dark arts admission:
Step 1: To register for this programme, the candidate needs to first go to the official webpage of the programme.
Step 2: There will be a tab ‘Enrol Now’. If you click it, you will first get access to try this programme for free but for 7 days only.
Step 3: Thereafter, sign up via Google or Facebook.
Step 4: Immediately the 7 days free trial will start. Once it is over, candidates will be required to pay fees to access the programme on a monthly basis.
The syllabus
Week 1: Understanding Security Threats
Videos
Readings
- Navigating Coursera
- How to Use Discussion Forums
- Get to Know Your Classmates
- Antimalware Protection, Malware Removal
- Supplemental Reading for Malicious Software
- Supplemental Reading for Network Attacks
- Supplemental Reading for DDoS Attacks
- Deceptive Attacks
- Physical Security
- Module 1 Glossary
Practice exercises
- Malicious Software
- Other Attacks
- Network Attacks
- Understanding Security Threats
Week 2: Pelcgbybtl (Cryptology)
Videos
- Cryptography
- Symmetric Cryptography
- Symmetric Encryption Algorithms
- Rob: The work of a security engineer
- Asymmetric Cryptography
- Symmetric Cryptography, Part Two
- Asymmetric Encryption Algorithms
- Hashing
- Hashing Algorithms
- Hashing Algorithms (continued)
- Public Key Infrastructure
- Certificates
- Cryptography in Action
- Securing Network Traffic
- Cryptographic Hardware
- Rejection
Readings
- Supplemental Reading for The Future of Cryptanalysis
- Supplemental Reading for Symmetric Encryptions
- Supplemental Reading for Asymmetric Encryption Attack
- Supplemental Reading for SHA1 Attacks
- Supplemental Reading for the X.509 Standard
- Supplemental Reading for PGP
- Supplemental Reading for Securing Network Traffic
- Supplemental Reading for TPM Attacks
- Module 2 Glossary
- Qwiklabs Introduction
Practice exercises
- Symmetric Encryption
- Public Key or Asymmetric Encryption
- Hashing
- Cryptography Applications
- Pelcgbybtl (Cryptology)
Week 3: The 3 A's of Cybersecurity: Authentication, Authorization, Accounting
Videos
- Best practices for authentication
- Multifactor Authentication
- Multifactor Authentication Options
- Certificates, Part Two
- RADIUS
- Kerberos
- TACACS+
- Single Sign-On
- Rob: My path to IT
- Authorization and Access Control Methods
- Access Control
- Access Control List
- Tracking Usage and Access
- Rob: Important skills in security
Readings
- Physical Privacy and Security Components
- Supplemental Reading for Authorization
- Mobile Security Methods
- Supplemental Reading for Authentication
- Module 3 Glossary
Practice exercises
- Authorization and Accounting
- Authentication
- Authentication, Authorization, Accounting Quiz
Week 4: Securing Your Networks
Videos
- Network Hardening Best Practices
- Network Hardware Hardening
- Network Software Hardening
- Joe: My personal obstacle
- WEP Encryption and Why You Shouldn't Use It
- Let's Get Rid of WEP!
- WPA2
- Wireless Hardening
- Heather: The impact of social engineering
- Sniffing the Network
- Wireshark and tcpdump
- Intrusion Detection/Prevention Systems
Readings
- Supplemental Reading for Network Hardening Best Practices
- Supplemental Reading on IEEE 802.1X
- Supplementary reading on HAProxy, nginx and Apache HTTP server
- Supplementary reading for WEP Encryption and Why You Shouldn't Use It
- Supplementary reading on WiFi Protected Setup (WPS) PIN brute force vulnerability
- Supplemental Reading for Promiscuous Model
- Supplemental reading for Intrusion Detection/Prevention System
- Unified Threat Management (UTM)
- Home Network Security
- Module 4 Glossary
Practice exercises
- Secure Network Architecture
- Wireless Security
- Network Monitoring
- Securing Your Networks
Week 5: Defense in Depth
Videos
- Intro to Defense in Depth
- Disabling Unnecessary Components
- Host-Based Firewall
- Logging and Auditing
- Antimalware Protection
- Disk Encryption
- Heather: Self-learning is the key to success
- Software Patch Management
- Application Policies
Readings
- Supplemental Reading for Logging and Auditing
- Windows Defender Guide
- Supplemental Readings for Antimalware Protection
- Supplemental Reading for Disk Encryption
- Browser Hardening
- Module 5 Glossary
Practice exercises
- System Hardening
- Application Hardening
- Defense in Depth
Week 6: Creating a Company Culture for Security
Videos
- Security Goals
- Measuring and Assessing Risk
- Privacy Policy
- User Habits
- Third-Party Security
- Security Training
- Alex: Qualities of an IT candidate
- Incident Reporting and Analysis
- Incident Response and Recovery
- Mobile Security and Privacy
- Amir: Tips for interviews
- Ari: Tips for interviews
- Interview Role Play: Security
- Final Assessment
- Framing yourself
- Congratulations!
Readings
- Supplemental Reading for Risk in the Workplace
- Data Destruction
- Supplemental Reading for User Habits
- Supplemental Reading for Vendor Security Assessment Questionnaires
- Incident Response
- Supplemental Readings for Mobile Security and Privacy
- Bring Your Own Device
- Invitation to Sign Up for Big Interview
- Final Project - Sample Submission
- How to Add Google IT Support Certificate to Your Resume and LinkedIn Profile
- Common Job Search Terms
- Module 6 Glossary
- Course 5 Glossary
- Information and FAQs about badges
Practice exercises
- Risk in the Workplace
- Users
- Incident Handling
- Creating a Company Culture for Security
- Creating a Company Culture for Security - Design Document
- Your Access to Google Job Search Resources
Week 7: Prepare for Jobs in IT Support
Readings
- Tailoring your Resume for IT Support
- Finding your Path and Perfect Role
- Personal Branding
- Recruiters, Headhunters and Staffing Agencies
- Write a Cover Letter
- Getting Started with LinkedIn
- How to get Interviews
- Learn More About Developing an Elevator Pitch
- Ask the Interviewer Questions1
- Prepare for Interviews with Interview Warmup
- Before you Accept, Negotiating the Contract
- Imposter Syndrome
- Working from Home for the Win (WFH FTW)
- Burnout
- Create a Career Development Plan
- Getting Promoted
- Related Technical Careers
- Social Emotional Skills
- Diversity, Inclusion, and Bias
- Advanced Communication Skills
Practice exercises
- Hands-on Activity: Adding Skills and Experience to your Resume
- Self Review - Build a Job Search Project Plan
- Create Questions to Ask your Interviewer
- Self-review: Practice Using the STAR Method to Answer Interview Questions
Scholarship Details
If the candidate is unable to pay for the fees, he/she can readily avail financial assistance for the programme from Coursera. To do so, the candidate needs to click on ‘Financial Aid’. Then click on the Enroll Now tab and apply for it.
How it helps
The IT Security: Defense against the digital dark arts certification programme gives immense opportunities for candidates to pursue advanced-level programmes. Developed by experts from industry, the candidates irrespective of coming from a basic level can easily pursue this programme. To make it easy to access, the programme is available in different subtitle languages namely, Arabic, Spanish, English and Portuguese. The knowledge gained throughout the curriculum will enable candidates to later apply it in real life. The certificate which is received post completion of the programme is a shareable one and hence can also be shared via LinkedIn. This will open more doors of opportunity for the candidate. The recruiters can easily access the information on this certificate and offer higher and better paying job opportunities to the candidates. They can even apply for higher positions in the same company or try to move into parallel companies.
FAQs
The IT Security: Defense against the digital dark arts programme by Coursera is conducted by Google.
Coursera excels in training and preparing the candidates to excel in their professional pathway. They do not facilitate or conduct any programme that helps the candidates in getting the job.
The programme does not have any limitations from an age point of view. You can enrol irrespective of being at any age.
The programme initially gives a 7-day free trial session for candidates. Post which one needs to make the fee payment to continue. Hence, there is no possibility to get a refund.
The IT Security: Defense against the digital dark arts programme has a very basic requirement of a laptop and a Wi-Fi Connection.
Articles
Popular Articles
Latest Articles
Similar Courses
Secure Software Development Requirements Design an...
The Linux Foundation via Edx
Secure Software Development Verification and More ...
The Linux Foundation via Edx
Secure Software Development Implementation
The Linux Foundation via Edx
AWS Fundamentals Addressing Security Risk
Amazon Web Services via Coursera
Amazon Web Services Getting Started with Cloud Sec...
Amazon Web Services via Edx
Security Operations and Administration
(ISC)² via Coursera
Courses of your interest
C++ Foundation
PW Skills
Data Science Foundations to Core Bootcamp
Springboard
User Experience Design And Research
UM–Ann Arbor via Futurelearn
Data Analysis with Excel for Complete Beginners
CloudSwyft Global Systems, Inc via Futurelearn
Artificial intelligence Design and Engineering wit...
CloudSwyft Global Systems, Inc via Futurelearn
Data Science Fundamentals on Microsoft Azure
CloudSwyft Global Systems, Inc via Futurelearn
Artificial Intelligence Projects
Great Learning
More Courses by Google
Fundamentals Training
Google Artificial Intelligence for JavaScript Deve...
Google via Edx
Coronavirus Powersearching
Google via Edx
Building No Code Apps with App Sheet Foundations
Google via Coursera
Introduction to Cloud Identity
Google via Coursera
CBRS Professional Training
Google via Coursera
Contact Center Artificial Intelligence Conversatio...
Google via Coursera
Understanding Your Google Cloud Costs
Google via Coursera
Developing a Google SRE Culture
Google via Coursera
Deploying SAP on Google Cloud
Google via Coursera