- Level Foundation
- Duration 32 hours
- Course by Google
-
Offered by
About
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We'll give you some background of encryption algorithms and how they're used to safeguard data. Then, we'll dive into the three As of information security: authentication, authorization, and accounting. We'll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team. At the end of this course, you'll understand: how various encryption algorithms and techniques work as well as their benefits and limitations. various authentication systems and types. the difference between authentication and authorization. how to evaluate potential risks and recommend ways to reduce risk. best practices for securing a network. how to help others to grasp security concepts and protect themselves.Modules
Introduction to IT Security
1
Videos
- Course Introduction
3
Readings
- Helpful resources and tips
- How to Use Discussion Forums
- Get to Know Your Classmates
Malicious Software
4
Videos
- The CIA Triad
- Essential Security Terms
- Malicious Software
- Malware Continued
2
Readings
- Antimalware Protection, Malware Removal
- Supplemental Reading for Malicious Software
1
Quiz
- Malicious Software
Network Attacks
2
Videos
- Network Attacks
- Denial-of-Service
2
Readings
- Supplemental Reading for Network Attacks
- Supplemental Reading for DDoS Attacks
1
Quiz
- Network Attacks
Other Attacks
3
Videos
- Client-Side Attacks
- Password Attacks
- Deceptive Attacks
3
Readings
- Deceptive Attacks
- Physical Security
- Module 1 Glossary
1
Quiz
- Other Attacks
Graded Assessments
1
Quiz
- Module 1 challenge: Understanding Security Threats
Symmetric Encryption
4
Videos
- Cryptography
- Symmetric Cryptography
- Symmetric Encryption Algorithms
- Rob: The work of a security engineer
2
Readings
- Supplemental Reading for The Future of Cryptanalysis
- Supplemental Reading for Symmetric Encryptions
1
Quiz
- Symmetric Encryption
Public Key or Asymmetric Encryption
3
Videos
- Asymmetric Cryptography
- Asymmetric vs. Symmetric Cryptography
- Asymmetric Encryption Algorithms
1
Readings
- Supplemental Reading for Asymmetric Encryption Attack
1
Quiz
- Public Key or Asymmetric Encryption
Hashing
3
Videos
- Hashing
- Hashing Algorithms
- Hashing Algorithms (continued)
1
Readings
- Supplemental Reading for SHA1 Attacks
1
Quiz
- Hashing
Cryptography Applications
6
Videos
- Public Key Infrastructure
- Certificates
- Cryptography in Action
- Securing Network Traffic
- Cryptographic Hardware
- Rejection
5
Readings
- Supplemental Reading for the X.509 Standard
- Supplemental Reading for PGP
- Supplemental Reading for Securing Network Traffic
- Supplemental Reading for TPM Attacks
- Module 2 Glossary
1
Quiz
- Cryptography Applications
Graded Assessments
1
Assignment
- Module 2 challenge: Pelcgbybtl (Cryptology)
2
External Tool
- Creating/inspecting key pair, encrypting/decrypting and sign/verify using OpenSSL
- Hands-on with Hashing
3
Readings
- Qwiklabs guidelines and troubleshooting steps
- Exemplar: Creating/inspecting key pair, encrypting/decrypting and sign/verify using OpenSSL
- Exemplar: Hands-on with hashing
1
Quiz
- Pelcgbybtl (Cryptology)
Authentication
9
Videos
- Best practices for authentication
- Multifactor Authentication
- Multifactor Authentication Options
- Certificates, Part Two
- RADIUS
- Kerberos
- TACACS+
- Single Sign-On
- Rob: My path to IT
2
Readings
- Physical Privacy and Security Components
- Supplemental Reading for Authentication
1
Quiz
- Authentication
Authorization
3
Videos
- Authorization and Access Control Methods
- Access Control
- Access Control List
2
Readings
- Mobile Security Methods
- Supplemental Reading for Authorization
Accounting
2
Videos
- Tracking Usage and Access
- Rob: Important skills in security
1
Readings
- Module 3 Glossary
1
Quiz
- Authorization and Accounting
Graded Assessments
1
Quiz
- Module 3 challenge: Authentication, Authorization, Accounting
Secure Network Architecture
4
Videos
- Network Hardening Best Practices
- Network Hardware Hardening
- Network Software Hardening
- Joe: My personal obstacle
3
Readings
- Supplemental Reading for Network Hardening Best Practices
- Supplemental Reading on IEEE 802.1X
- Supplementary reading on HAProxy, nginx and Apache HTTP server
1
Quiz
- Secure Network Architecture
Wireless Security
5
Videos
- WEP Encryption and Why You Shouldn't Use It
- Let's Get Rid of WEP!
- WPA2
- Wireless Hardening
- Heather: The impact of social engineering
2
Readings
- Supplementary reading for WEP Encryption and Why You Shouldn't Use It
- Supplementary reading on WiFi Protected Setup (WPS) PIN brute force vulnerability
1
Quiz
- Wireless Security
Network Monitoring
3
Videos
- Sniffing the Network
- Wireshark and tcpdump
- Intrusion Detection/Prevention Systems
5
Readings
- Supplemental Reading for Promiscuous Mode
- Supplemental reading for Intrusion Detection/Prevention System
- Unified Threat Management (UTM)
- Home Network Security
- Module 4 Glossary
1
Quiz
- Network Monitoring
Graded Assessments
1
Assignment
- Module 4 challenge: Securing Your Networks
1
External Tool
- Introduction to tcpdump
1
Readings
- Exemplar: Introduction to tcpdump
1
Quiz
- Securing Your Networks
System Hardening
7
Videos
- Intro to Defense in Depth
- Disabling Unnecessary Components
- Host-Based Firewall
- Logging and Auditing
- Antimalware Protection
- Disk Encryption
- Heather: Self-learning is the key to success
4
Readings
- Supplemental Reading for Logging and Auditing
- Windows Defender Guide
- Supplemental Readings for Antimalware Protection
- Supplemental Reading for Disk Encryption
1
Quiz
- System Hardening
Application Hardening
2
Videos
- Software Patch Management
- Application Policies
2
Readings
- Browser Hardening
- Module 5 Glossary
1
Quiz
- Application Hardening
Graded Assessments
1
Quiz
- Module 5 challenge: Defense in Depth
Risk in the Workplace
3
Videos
- Security Goals
- Measuring and Assessing Risk
- Privacy Policy
2
Readings
- Supplemental Reading for Risk in the Workplace
- Data Destruction
1
Quiz
- Risk in the Workplace
Users
4
Videos
- User Habits
- Third-Party Security
- Security Training
- Alex: Qualities of an IT candidate
2
Readings
- Supplemental Reading for User Habits
- Supplemental Reading for Vendor Security Assessment Questionnaires
1
Quiz
- Users
Incident Handling
6
Videos
- Incident Reporting and Analysis
- Incident Response and Recovery
- Mobile Security and Privacy
- Amir: Tips for interviews
- Ari: Tips for interviews
- Interview Role Play: Security
4
Readings
- Incident Response
- Supplemental Readings for Mobile Security and Privacy
- Bring Your Own Device
- Invitation to Sign Up for Big Interview
1
Quiz
- Incident Handling
Graded Assessments
1
Videos
- Final Assessment
1
Readings
- Final Project - Sample Submission
2
Quiz
- Module 6 challenge: Creating a Company Culture for Security
- Creating a Company Culture for Security - Design Document
AI for IT Support
1
Assignment
- Activity: Use generative AI to write a message to users
7
Videos
- Boost your IT Support skills with AI
- Leverage AI for faster troubleshooting
- Communicate technical concepts with AI
- Automate routine tasks with AI
- Simplify IT documentation using AI
- Use AI to identify IT security risks
- Introducing Google AI Essentials
4
Readings
- Introduction to AI for IT Support
- Use generative AI to work smarter and faster
- Key takeaways for AI in IT Support
- Take the next step with Google AI Essentials
Course Wrap Up
2
Videos
- Framing yourself
- Congratulations!
5
Readings
- How to Add Google IT Support Certificate to Your Resume and LinkedIn Profile
- Common Job Search Terms
- Module 6 Glossary
- Course 5 Glossary
- Information and FAQs about badges
1
Quiz
- Resources for Google IT Support Certificate graduates
Create an effective resume and job search strategy
1
Videos
- What is your career identity?
7
Readings
- Tailoring your Resume for IT Support
- Finding your Path and Perfect Role
- Personal Branding
- Recruiters, Headhunters and Staffing Agencies
- Write a Cover Letter
- Getting Started with LinkedIn
- How to get Interviews
2
Quiz
- Hands-on Activity: Adding Skills and Experience to your Resume
- Self Review - Build a Job Search Project Plan
Interview for IT support jobs
4
Readings
- Learn More About Developing an Elevator Pitch
- Ask the Interviewer Questions
- Prepare for Interviews with Interview Warmup
- Before you Accept, Negotiating the Contract
2
Quiz
- Create Questions to Ask your Interviewer
- Self-review: Practice Using the STAR Method to Answer Interview Questions
Career development
6
Readings
- Imposter Syndrome
- Working from Home for the Win (WFH FTW)
- Burnout
- Create a Career Development Plan
- Getting Promoted
- Related Technical Careers
Inclusive workplaces
3
Readings
- Social Emotional Skills
- Diversity, Inclusion, and Bias
- Advanced Communication Skills
Auto Summary
"IT Security: Defense against the Digital Dark Arts" is a foundational course in IT & Computer Science, led by Google experts on Coursera. It delves into essential IT security concepts, tools, and best practices, covering encryption, authentication, authorization, and network security solutions. Over 1920 minutes, learners will gain a comprehensive understanding of multi-layered security architecture and risk management. Subscription options include Starter, Professional, and Paid, making it accessible to a wide audience aiming to enhance their IT security skills.

Google Career Certificates