À propos de ce cours
4.7
1,505 notes
241 avis
100 % en ligne

100 % en ligne

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Dates limites flexibles

Dates limites flexibles

Réinitialisez les dates limites selon votre disponibilité.
Niveau débutant

Niveau débutant

Heures pour terminer

Approx. 18 heures pour terminer

Recommandé : 8 hours/week...
Langues disponibles

Anglais

Sous-titres : Anglais, Arabe

Compétences que vous acquerrez

CybersecurityWireless SecurityCryptographyNetwork Security
100 % en ligne

100 % en ligne

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Dates limites flexibles

Dates limites flexibles

Réinitialisez les dates limites selon votre disponibilité.
Niveau débutant

Niveau débutant

Heures pour terminer

Approx. 18 heures pour terminer

Recommandé : 8 hours/week...
Langues disponibles

Anglais

Sous-titres : Anglais, Arabe

Programme du cours : ce que vous apprendrez dans ce cours

Semaine
1
Heures pour terminer
3 heures pour terminer

Understanding Security Threats

Welcome to the IT Security course of the IT Support Professional Certificate! In the first week of this course, we will cover the basics of security in an IT environment. We will learn how to define and recognize security risks, vulnerabilities and threats. We'll identify the most common security attacks in an organization and understand how security revolves around the "CIA" principle. By the end of this module, you will know the types of malicious software, network attacks, client-side attacks, and the essential security terms you'll see in the workplace. ...
Reading
10 vidéos (Total 36 min), 7 lectures, 4 quiz
Video10 vidéos
The CIA Triad2 min
Essential Security Terms4 min
Malicious Software5 min
Malware Continued2 min
Network Attacks3 min
Denial-of-Service3 min
Client-Side Attacks2 min
Password Attacks2 min
Deceptive Attacks3 min
Reading7 lectures
Navigating Coursera10 min
Program Surveys10 min
How to Use Discussion Forums10 min
Get to Know Your Classmates10 min
Supplemental Reading for Malicious Software10 min
Supplemental Reading for Network Attacks10 min
Supplemental Reading for DDoS Attacks10 min
Quiz4 exercices pour s'entraîner
Malicious Software14 min
Network Attacks8 min
Other Attacks6 min
Understanding Security Threats26 min
Semaine
2
Heures pour terminer
6 heures pour terminer

Pelcgbybtl (Cryptology)

In the second week of this course, we'll learn about cryptology. We'll explore different types of encryption practices and how they work. We'll show you the most common algorithms used in cryptography and how they've evolved over time. By the end of this module, you'll understand how symmetric encryption, asymmetric encryption, and hashing work; you'll also know how to choose the most appropriate cryptographic method for a scenario you may see in the workplace. ...
Reading
14 vidéos (Total 87 min), 9 lectures, 7 quiz
Video14 vidéos
Symmetric Cryptography5 min
Symmetric Encryption Algorithms9 min
Rob What a Security Engineer Does1 min
Asymmetric Cryptography7 min
Asymmetric Encryption Algorithms5 min
Hashing3 min
Hashing Algorithms5 min
Hashing Algorithms (continued)5 min
Public Key Infrastructure9 min
Cryptography in Action8 min
Securing Network Traffic6 min
Cryptographic Hardware6 min
Instructions for Accessing Linux Qwiklabs5 min
Reading9 lectures
Supplemental Reading for The Future of Cryptanalysis10 min
Supplemental Reading for Symmetric Encryptions10 min
Supplemental Reading for Asymmetric Encryption Attack10 min
Supplemental Reading for SHA1 Attacks10 min
Supplemental Reading for the X.509 Standard10 min
Supplemental Reading for PGP10 min
Supplemental Reading for Securing Network Traffic10 min
Supplemental Reading for TPM Attacks10 min
Instructions for Accessing Qwiklabs10 min
Quiz5 exercices pour s'entraîner
Symmetric Encryption10 min
Public Key or Asymmetric Encryption6 min
Hashing8 min
Cryptography Applications6 min
Week Two Practice Quiz28 min
Semaine
3
Heures pour terminer
2 heures pour terminer

AAA Security (Not Roadside Assistance)

In the third week of this course, we'll learn about the "three A's" in cybersecurity. No matter what type of tech role you're in, it's important to understand how authentication, authorization, and accounting work within an organization. By the end of this module, you'll be able to choose the most appropriate method of authentication, authorization, and level of access granted for users in an organization....
Reading
14 vidéos (Total 55 min), 2 lectures, 3 quiz
Video14 vidéos
Multifactor Authentication12 min
Certificates3 min
LDAP3 min
RADIUS1 min
Kerberos7 min
TACACS+1 min
Single Sign-On3 min
Rob Path to IT1 min
Authorization and Access Control Methods1 min
Access Control5 min
Access Control List1 min
Tracking Usage and Access3 min
Rob Important Skills in Security1 min
Reading2 lectures
Supplemental Reading for Authentication10 min
Supplemental Reading for Authorization10 min
Quiz3 exercices pour s'entraîner
Authentication26 min
Authorization and Accounting6 min
AAA Security (Not Roadside Assistance)22 min
Semaine
4
Heures pour terminer
4 heures pour terminer

Securing Your Networks

In the fourth week of this course, we'll learn about secure network architecture. It's important to know how to implement security measures on a network environment, so we'll show you some of the best practices to protect an organization's network. We'll learn about some of the risks of wireless networks and how to mitigate them. We'll also cover ways to monitor network traffic and read packet captures. By the end of this module, you'll understand how VPNs, proxies and reverse proxies work; why 802.1X is a super important for network protection; understand why WPA/WPA2 is better than WEP; and know how to use tcpdump to capture and analyze packets on a network. That's a lot of information, but well worth it for an IT Support Specialist to understand! ...
Reading
11 vidéos (Total 70 min), 5 lectures, 5 quiz
Video11 vidéos
Network Hardware Hardening9 min
Network Software Hardening5 min
Joe Personal Obstacle44s
WEP Encryption and Why You Shouldn't Use It8 min
Let's Get Rid of WEP! WPA/WPA214 min
Wireless Hardening3 min
Heather Social Engineering1 min
Sniffing the Network5 min
Wireshark and tcpdump6 min
Intrusion Detection/Prevention Systems6 min
Reading5 lectures
Supplemental Reading for Network Hardening Best Practices10 min
Supplemental Reading on IEEE 802.1X10 min
Supplementary reading on HAProxy, nginx and Apache HTTP server10 min
Supplementary reading on WiFi Protected Setup (WPS) PIN brute force vulnerability10 min
Supplemental Reading for Promiscuous Mode10 min
Quiz4 exercices pour s'entraîner
Secure Network Architecture14 min
Wireless Security8 min
Network Monitoring10 min
Week Four Practice Quiz34 min
4.7
241 avisChevron Right
Orientation de carrière

50%

a commencé une nouvelle carrière après avoir terminé ces cours
Avantage de carrière

50%

a bénéficié d'un avantage concret dans sa carrière grâce à ce cours

Meilleurs avis

par DSApr 26th 2018

Great course that is full of useful information and presented in an easy to understand way. It's an awesome beginner course that will add to your knowledge and further your knowledge of IT security.

par DSAug 17th 2018

This course was insane, all the possibilities, the potential for growth, and the different ways to help protect against cyber attacks. It was truly an eye-opening lesson in security. Thank you.

Enseignant

À propos de Google

The IT Support Professional Certificate program is part of Grow with Google, an initiative that draws on Google's 20-year history of building products, platforms, and services that help people and businesses grow. Through programs like these, we aim to help everyone– those who make up the workforce of today and the students who will drive the workforce of tomorrow – access the best of Google’s training and tools to grow their skills, careers, and businesses....

À propos de la Spécialisation Google IT Support Professional Certificate

This five-course certificate, developed by Google, includes innovative curriculum designed to prepare you for an entry-level role in IT support. A job in IT can mean in-person or remote help desk work in a small business or at a global company like Google. If you’ve been tinkering with IT or are new to the field, you’re at the right place. The program is part of Grow with Google, a Google initiative to help create economic opportunities for all Americans. Check out this video to learn more. Upon completion of the certificate, you can share your information with top employers like Cognizant, GE Digital, H&R Block, Hulu, J.M. Smucker, Infosys, Intel, KForce, MCPc, PNC Bank, RICOH USA, Sprint, TEKSystems, UPMC, Veterans United Home Loans, Walmart and their subsidiaries, and of course, Google. Through a mix of video lectures, quizzes, and hand-on labs and widgets, the program will introduce you to troubleshooting and customer service, networking, operating systems, system administration and security. Along the way, you’ll hear from Googlers with unique backgrounds whose own foundation in IT support served as a jumping off point for their careers. By dedicating 8-10 hours a week, you can complete the certificate in about eight months. You can skip through content that you might already know and speed ahead to the graded assessments. Except as otherwise noted, the contents on this site are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License....
Google IT Support Professional Certificate

Foire Aux Questions

  • Une fois que vous êtes inscrit(e) pour un Certificat, vous pouvez accéder à toutes les vidéos de cours, et à tous les quiz et exercices de programmation (le cas échéant). Vous pouvez soumettre des devoirs à examiner par vos pairs et en examiner vous-même uniquement après le début de votre session. Si vous préférez explorer le cours sans l'acheter, vous ne serez peut-être pas en mesure d'accéder à certains devoirs.

  • Lorsque vous vous inscrivez au cours, vous bénéficiez d'un accès à tous les cours du Certificat, et vous obtenez un Certificat lorsque vous avez réussi. Votre Certificat électronique est alors ajouté à votre page Accomplissements. À partir de cette page, vous pouvez imprimer votre Certificat ou l'ajouter à votre profil LinkedIn. Si vous souhaitez seulement lire et visualiser le contenu du cours, vous pouvez accéder gratuitement au cours en tant qu'auditeur libre.

D'autres questions ? Visitez le Centre d'Aide pour les Etudiants.