Coursera
Coursera Logo

Introduction to IT Security 

  • Offered byCoursera

Introduction to IT Security
 at 
Coursera 
Overview

Duration

22 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Introduction to IT Security
 at 
Coursera 
Highlights

  • Flexible deadlines Reset deadlines in accordance to your schedule.
  • Shareable Certificate Earn a Certificate upon completion
  • 100% online Start instantly and learn at your own schedule.
  • Coursera Labs Includes hands on learning projects. Learn more about Coursera Labs External Link
  • Beginner Level No background needed.
  • Approx. 22 hours to complete
  • English Subtitles: English
Read more
Details Icon

Introduction to IT Security
 at 
Coursera 
Course details

More about this course
  • Students will learn about the security management process. They will examine risk and risk management, including quantitative and qualitative risk assessments. The course includes discussion of security control types and physical security controls. Students will explore all aspects of Identity and Access Management (IAM) including single-factor and multi-factor authentication, account and access control, single sign-on and federation. Students will learn to harden endpoint devices including mobile and IoT devices. Students explore cryptography including symmetric and asymmetric encryption, hashing and digital signatures, and using Public Key Infrastructure (PKI) to create and manage certificates. Students explore network security including defense in depth, firewalls, IDS/IPS, wireless security, remote access, and cloud computing. Students explore vulnerability management, ethical hacking, and compliance. Then they learn about attackers, social engineering, malware, software/network attacks, wireless and password attacks. Students learn about incident response, forensics, and planning for business continuity. Labs encourage students to apply security concepts to their personal lives, practice applying security to networks, and even include hacking and forensic simulations. At the end of the course, students will complete a capstone project to demonstrate mastery of course objectives and use for personal branding.
Read more

Introduction to IT Security
 at 
Coursera 
Curriculum

Security Fundamentals

Introduction to the ATA Program

Overview of ATA Track

Advice for Completing the ATA Program

Security Course Syllabus

Security

Risk

Security Management Process

Physical Security

Physical Security Controls

Environmental Exposures

Security Fundamentals Review

Analyze Risk for a Physical Facility

The Information Security Cycle Practice Assessment

Physical Security Practice Assessment

Security Fundamentals Graded Assessment

Authentication

Authentication Factors

Strong Passwords

Multiple and Shared Accounts

Account Management

Single Sign-On

Access Control

Authentication and Account Management Review

Develop Authentication and Access Control Policies

Authentication Practice Assessment

Account Management Practice Assessment

Authentication and Account Management Graded Assessment

Hardening Endpoints

Patch Management

Application Control

Mobile Devices

Location Services

Application Control

Device Security Review

Personal Security Assessment

Endpoint Security Practice Assessment

Mobile Device Security Practice Assessment

Device Security Graded Assessment

Encryption

Cryptography Overview

Symmetric Encryption

Asymmetric Encryption

Hashes

Digital Certificates

Digital Signatures

HTTPS Example

Public Key Infrastructure

Certificate Life Cycle

Key Escrow

Cryptography Fundamentals Review

Examining Certificates

Cryptography Fundamentals Practice Assessment

Certificates Practice Assessment

Public Key Infrastructure (PKI) Practice Assessment

Cryptography Fundamentals Graded Assessment

Defense in Depth

Firewalls

Intrusion Detection and Prevention Systems

Wireless Networks

Implementing Wireless

Securing Wireless

Remote Access

Remote Access Protocols

Cloud Computing

Network Security Review

Network Components

802.11 Standards

Install Packet Tracer

Exploring NAT

Configuring VLANs

Configure Wireless

Defense in Depth Practice Assessment

Wireless Networks Practice Assessment

Extending the Network Perimeter Practice Assessment

Network Security Graded Assessment

Security Management

Vulnerability Scanning

Ethical Hacking

Data Security

Security Documents

Typical Security Policies

Risk

Compliance

Security Management Review

Security Utilities

Explore Vulnerabilities

Assessing Vulnerabilities Practice Assessment

Risk Management Practice Assessment

Security Management Graded Assessment

Attackers

Social Engineering

Web Attacks

Malware

Software/Network Attacks

Wireless Attacks

Password Attacks

Security Threats Review

Explore Hacking

Social Engineering and Web Attacks Practice Assessment

Malware and Other Attacks Practice Assessment

Security Threats Graded Assessment

Managing Security Incidents

Respond to Security Incidents Review

Security Incident Management

Incident Response Plans

Stages of Incident Response

Forensics

Business Continuity Plan

Redundancy

Testing

Disaster Recovery Process

RAID

Backups

Perform Forensics

Respond to Security Incidents Practice Assessment

Business Continuity Practice Assessment

Execute DRPs and Procedures Practice Assessment

Respond to Security Incidents Graded Assessment

Capstone Introduction

Capstone Instructions

PowerPoint Tutorial

Introduction to IT Security
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Introduction to IT Security
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...