This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: Authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.
At the end of this course, you’ll understand:
- how various encryption algorithms and techniques work and their benefits and limitations.
- various authentication systems and types.
- the difference between authentication and authorization.
At the end of this course, you’ll be able to:
- evaluate potential risks and recommend ways to reduce risk.
- make recommendations on how best to secure a network.
- help others to understand security concepts and protect themselves.
À partir de la leçon
Creating a Company Culture for Security
Congratulations, you've made it to the final week in the course! In the last week of this course, we'll explore ways to create a company culture for security. It's important for any tech role to determine appropriate measures to meet the three goals of security. By the end of this module, you will develop a security plan for an organization to demonstrate the skills you've learned in this course. You're almost done, keep up the great work!