Introduction to IT Security
- Offered byCoursera
Introduction to IT Security at Coursera Overview
Duration | 22 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Official Website | Explore Free Course |
Credential | Certificate |
Introduction to IT Security at Coursera Highlights
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Coursera Labs Includes hands on learning projects. Learn more about Coursera Labs External Link
- Beginner Level No background needed.
- Approx. 22 hours to complete
- English Subtitles: English
Introduction to IT Security at Coursera Course details
- Students will learn about the security management process. They will examine risk and risk management, including quantitative and qualitative risk assessments. The course includes discussion of security control types and physical security controls. Students will explore all aspects of Identity and Access Management (IAM) including single-factor and multi-factor authentication, account and access control, single sign-on and federation. Students will learn to harden endpoint devices including mobile and IoT devices. Students explore cryptography including symmetric and asymmetric encryption, hashing and digital signatures, and using Public Key Infrastructure (PKI) to create and manage certificates. Students explore network security including defense in depth, firewalls, IDS/IPS, wireless security, remote access, and cloud computing. Students explore vulnerability management, ethical hacking, and compliance. Then they learn about attackers, social engineering, malware, software/network attacks, wireless and password attacks. Students learn about incident response, forensics, and planning for business continuity. Labs encourage students to apply security concepts to their personal lives, practice applying security to networks, and even include hacking and forensic simulations. At the end of the course, students will complete a capstone project to demonstrate mastery of course objectives and use for personal branding.
Introduction to IT Security at Coursera Curriculum
Security Fundamentals
Introduction to the ATA Program
Overview of ATA Track
Advice for Completing the ATA Program
Security Course Syllabus
Security
Risk
Security Management Process
Physical Security
Physical Security Controls
Environmental Exposures
Security Fundamentals Review
Analyze Risk for a Physical Facility
The Information Security Cycle Practice Assessment
Physical Security Practice Assessment
Security Fundamentals Graded Assessment
Authentication
Authentication Factors
Strong Passwords
Multiple and Shared Accounts
Account Management
Single Sign-On
Access Control
Authentication and Account Management Review
Develop Authentication and Access Control Policies
Authentication Practice Assessment
Account Management Practice Assessment
Authentication and Account Management Graded Assessment
Hardening Endpoints
Patch Management
Application Control
Mobile Devices
Location Services
Application Control
Device Security Review
Personal Security Assessment
Endpoint Security Practice Assessment
Mobile Device Security Practice Assessment
Device Security Graded Assessment
Encryption
Cryptography Overview
Symmetric Encryption
Asymmetric Encryption
Hashes
Digital Certificates
Digital Signatures
HTTPS Example
Public Key Infrastructure
Certificate Life Cycle
Key Escrow
Cryptography Fundamentals Review
Examining Certificates
Cryptography Fundamentals Practice Assessment
Certificates Practice Assessment
Public Key Infrastructure (PKI) Practice Assessment
Cryptography Fundamentals Graded Assessment
Defense in Depth
Firewalls
Intrusion Detection and Prevention Systems
Wireless Networks
Implementing Wireless
Securing Wireless
Remote Access
Remote Access Protocols
Cloud Computing
Network Security Review
Network Components
802.11 Standards
Install Packet Tracer
Exploring NAT
Configuring VLANs
Configure Wireless
Defense in Depth Practice Assessment
Wireless Networks Practice Assessment
Extending the Network Perimeter Practice Assessment
Network Security Graded Assessment
Security Management
Vulnerability Scanning
Ethical Hacking
Data Security
Security Documents
Typical Security Policies
Risk
Compliance
Security Management Review
Security Utilities
Explore Vulnerabilities
Assessing Vulnerabilities Practice Assessment
Risk Management Practice Assessment
Security Management Graded Assessment
Attackers
Social Engineering
Web Attacks
Malware
Software/Network Attacks
Wireless Attacks
Password Attacks
Security Threats Review
Explore Hacking
Social Engineering and Web Attacks Practice Assessment
Malware and Other Attacks Practice Assessment
Security Threats Graded Assessment
Managing Security Incidents
Respond to Security Incidents Review
Security Incident Management
Incident Response Plans
Stages of Incident Response
Forensics
Business Continuity Plan
Redundancy
Testing
Disaster Recovery Process
RAID
Backups
Perform Forensics
Respond to Security Incidents Practice Assessment
Business Continuity Practice Assessment
Execute DRPs and Procedures Practice Assessment
Respond to Security Incidents Graded Assessment
Capstone Introduction
Capstone Instructions
PowerPoint Tutorial