- Level Foundation
- المدة 23 ساعات hours
- الطبع بواسطة Akamai Technologies, Inc.
-
Offered by
عن
Students will learn about the security management process. They will examine risk and risk management, including quantitative and qualitative risk assessments. The course includes discussion of security control types and physical security controls. Students will explore all aspects of Identity and Access Management (IAM) including single-factor and multi-factor authentication, account and access control, single sign-on and federation. Students will learn to harden endpoint devices including mobile and IoT devices. Students explore cryptography including symmetric and asymmetric encryption, hashing and digital signatures, and using Public Key Infrastructure (PKI) to create and manage certificates. Students explore network security including defense in depth, firewalls, IDS/IPS, wireless security, remote access, and cloud computing. Students explore vulnerability management, ethical hacking, and compliance. Then they learn about attackers, social engineering, malware, software/network attacks, wireless and password attacks. Students learn about incident response, forensics, and planning for business continuity. Labs encourage students to apply security concepts to their personal lives, practice applying security to networks, and even include hacking and forensic simulations. At the end of the course, students will complete a capstone project to demonstrate mastery of course objectives and use for personal branding.الوحدات
Course Introduction
4
Videos
- Introduction to the ATA Program
- Overview of ATA Track
- Advice for Completing the ATA Program
- Security Course Syllabus
1
Readings
- README
The Information Security Cycle
1
Assignment
- The Information Security Cycle Practice Assessment
1
Discussions
- What's your risk appetite?
3
Videos
- Security
- Risk
- Security Management Process
Physical Security
1
Assignment
- Physical Security Practice Assessment
1
Discussions
- How do you handle physical security?
3
Videos
- Physical Security
- Physical Security Controls
- Environmental Exposures
Security Fundamentals Lab
1
Readings
- Analyze Risk for a Physical Facility
Security Fundamentals Review and Graded Assessment
1
Assignment
- Security Fundamentals Graded Assessment
1
Videos
- Security Fundamentals Review
Authentication
1
Assignment
- Authentication Practice Assessment
1
Discussions
- So many web sites, too many passwords!
3
Videos
- Authentication
- Authentication Factors
- Strong Passwords
Account Management
1
Assignment
- Account Management Practice Assessment
4
Videos
- Multiple and Shared Accounts
- Account Management
- Single Sign-On
- Access Control
Authentication and Account Management Lab
1
Discussions
- Develop Authentication and Access Control Policies
1
Readings
- Develop Authentication and Access Control Policies
Authentication and Account Management Review and Graded Assessment
1
Assignment
- Authentication and Account Management Graded Assessment
1
Videos
- Authentication and Account Management Review
Endpoint Security
1
Assignment
- Endpoint Security Practice Assessment
3
Videos
- Hardening Endpoints
- Patch Management
- Application Control
Mobile Device Security
1
Assignment
- Mobile Device Security Practice Assessment
3
Videos
- Mobile Devices
- Location Services
- Application Control
Device Security Lab
1
Readings
- Personal Security Assessment
Device Security Review and Graded Assessment
1
Assignment
- Device Security Graded Assessment
1
Videos
- Device Security Review
Cryptography Fundamentals
1
Assignment
- Cryptography Fundamentals Practice Assessment
4
Videos
- Cryptography Overview
- Symmetric Encryption
- Asymmetric Encryption
- Hashes
Certificates
1
Assignment
- Certificates Practice Assessment
3
Videos
- Digital Certificates
- Digital Signatures
- HTTPS Example
Public Key Infrastructure (PKI)
1
Assignment
- Public Key Infrastructure (PKI) Practice Assessment
3
Videos
- Public Key Infrastructure
- Certificate Life Cycle
- Key Escrow
Cryptography Fundamentals Lab
1
Discussions
- Let it all out!
1
Readings
- Examining Certificates
Cryptography Fundamentals Review and Graded Assessment
1
Assignment
- Cryptography Fundamentals Graded Assessment
1
Videos
- Cryptography Fundamentals Review
Defense in Depth
1
Assignment
- Defense in Depth Practice Assessment
3
Videos
- Defense in Depth
- Firewalls
- Intrusion Detection and Prevention Systems
1
Readings
- Network Components
Wireless Networks
1
Assignment
- Wireless Networks Practice Assessment
3
Videos
- Wireless Networks
- Implementing Wireless
- Securing Wireless
1
Readings
- 802.11 Standards
Extending the Network Perimeter
1
Assignment
- Extending the Network Perimeter Practice Assessment
3
Videos
- Remote Access
- Remote Access Protocols
- Cloud Computing
Network Security Lab
4
Readings
- Install Packet Tracer
- Exploring NAT
- Configuring VLANs
- Configure Wireless
Network Security Review and Graded Assessment
1
Assignment
- Network Security Graded Assessment
1
Videos
- Network Security Review
Assessing Vulnerabilities
1
Assignment
- Assessing Vulnerabilities Practice Assessment
2
Videos
- Vulnerability Scanning
- Ethical Hacking
1
Readings
- Security Utilities
Risk Management
1
Assignment
- Risk Management Practice Assessment
1
Discussions
- Risky Business
5
Videos
- Data Security
- Security Documents
- Typical Security Policies
- Risk
- Compliance
Security Management Lab
1
Readings
- Explore Vulnerabilities
Security Management Review and Graded Assessment
1
Assignment
- Security Management Graded Assessment
1
Videos
- Security Management Review
Social Engineering and Web Attacks
1
Assignment
- Social Engineering and Web Attacks Practice Assessment
3
Videos
- Attackers
- Social Engineering
- Web Attacks
Malware and Other Attacks
1
Assignment
- Malware and Other Attacks Practice Assessment
4
Videos
- Malware
- Software/Network Attacks
- Wireless Attacks
- Password Attacks
Security Threats Lab
1
Discussions
- Are you paranoid yet?
1
Readings
- Explore Hacking
Security Threats Review and Graded Assessment
1
Assignment
- Security Threats Graded Assessment
1
Videos
- Security Threats Review
Respond to Security Incidents
1
Assignment
- Respond to Security Incidents Practice Assessment
4
Readings
- Security Incident Management
- Incident Response Plans
- Stages of Incident Response
- Forensics
Business Continuity
1
Assignment
- Business Continuity Practice Assessment
3
Readings
- Business Continuity Plan
- Redundancy
- Testing
Execute DRPs and Procedures
1
Assignment
- Execute DRPs and Procedures Practice Assessment
3
Readings
- Disaster Recovery Process
- RAID
- Backups
Respond to Security Incidents Lab
1
Readings
- Perform Forensics
Respond to Security Incidents Review and Graded Assessment
1
Assignment
- Respond to Security Incidents Graded Assessment
1
Videos
- Respond to Security Incidents Review
Capstone
1
Peer Review
- Introduction to IT Security Capstone
3
Videos
- Capstone Introduction
- Capstone Instructions
- PowerPoint Tutorial
Auto Summary
"Introduction to IT Security" is a foundational course offered by Coursera in the IT & Computer Science domain. Taught by expert instructors, this course covers security management, risk assessment, IAM, endpoint hardening, cryptography, network security, vulnerability management, and incident response. With engaging labs and a capstone project, learners can apply concepts practically. The course spans 1380 minutes and is available via Starter and Professional subscriptions, ideal for beginners aiming to enhance their IT security skills.
Shadow Farrell