Über diesen Kurs
233,222

100 % online

Beginnen Sie sofort und lernen Sie in Ihrem eigenen Tempo.

Flexible Fristen

Setzen Sie Fristen gemäß Ihrem Zeitplan zurück.

Stufe „Anfänger“

Ca. 19 Stunden zum Abschließen

Empfohlen: 10 hours/week...

Englisch

Untertitel: Englisch, Portugiesisch (Brasilien), Arabischer Raum

Kompetenzen, die Sie erwerben

CybersecurityWireless SecurityCryptographyNetwork Security

100 % online

Beginnen Sie sofort und lernen Sie in Ihrem eigenen Tempo.

Flexible Fristen

Setzen Sie Fristen gemäß Ihrem Zeitplan zurück.

Stufe „Anfänger“

Ca. 19 Stunden zum Abschließen

Empfohlen: 10 hours/week...

Englisch

Untertitel: Englisch, Portugiesisch (Brasilien), Arabischer Raum

Lehrplan - Was Sie in diesem Kurs lernen werden

Woche
1
3 Stunden zum Abschließen

Understanding Security Threats

Welcome to the IT Security course of the IT Support Professional Certificate! In the first week of this course, we will cover the basics of security in an IT environment. We will learn how to define and recognize security risks, vulnerabilities and threats. We'll identify the most common security attacks in an organization and understand how security revolves around the "CIA" principle. By the end of this module, you will know the types of malicious software, network attacks, client-side attacks, and the essential security terms you'll see in the workplace. ...
10 Videos (Gesamt 36 min), 7 Lektüren, 4 Quiz
10 Videos
The CIA Triad2m
Essential Security Terms4m
Malicious Software5m
Malware Continued2m
Network Attacks3m
Denial-of-Service3m
Client-Side Attacks2m
Password Attacks2m
Deceptive Attacks3m
7 Lektüren
Navigating Coursera10m
Program Surveys10m
How to Use Discussion Forums10m
Get to Know Your Classmates10m
Supplemental Reading for Malicious Software10m
Supplemental Reading for Network Attacks10m
Supplemental Reading for DDoS Attacks10m
4 praktische Übungen
Malicious Software14m
Network Attacks8m
Other Attacks6m
Understanding Security Threats26m
Woche
2
6 Stunden zum Abschließen

Pelcgbybtl (Cryptology)

In the second week of this course, we'll learn about cryptology. We'll explore different types of encryption practices and how they work. We'll show you the most common algorithms used in cryptography and how they've evolved over time. By the end of this module, you'll understand how symmetric encryption, asymmetric encryption, and hashing work; you'll also know how to choose the most appropriate cryptographic method for a scenario you may see in the workplace. ...
14 Videos (Gesamt 87 min), 9 Lektüren, 7 Quiz
14 Videos
Symmetric Cryptography5m
Symmetric Encryption Algorithms9m
Rob What a Security Engineer Does1m
Asymmetric Cryptography7m
Asymmetric Encryption Algorithms5m
Hashing3m
Hashing Algorithms5m
Hashing Algorithms (continued)5m
Public Key Infrastructure9m
Cryptography in Action8m
Securing Network Traffic6m
Cryptographic Hardware6m
Instructions for Accessing Linux Qwiklabs5m
9 Lektüren
Supplemental Reading for The Future of Cryptanalysis10m
Supplemental Reading for Symmetric Encryptions10m
Supplemental Reading for Asymmetric Encryption Attack10m
Supplemental Reading for SHA1 Attacks10m
Supplemental Reading for the X.509 Standard10m
Supplemental Reading for PGP10m
Supplemental Reading for Securing Network Traffic10m
Supplemental Reading for TPM Attacks10m
Instructions for Accessing Qwiklabs10m
5 praktische Übungen
Symmetric Encryption10m
Public Key or Asymmetric Encryption6m
Hashing8m
Cryptography Applications6m
Week Two Practice Quiz28m
Woche
3
2 Stunden zum Abschließen

AAA Security (Not Roadside Assistance)

In the third week of this course, we'll learn about the "three A's" in cybersecurity. No matter what type of tech role you're in, it's important to understand how authentication, authorization, and accounting work within an organization. By the end of this module, you'll be able to choose the most appropriate method of authentication, authorization, and level of access granted for users in an organization....
14 Videos (Gesamt 55 min), 2 Lektüren, 3 Quiz
14 Videos
Multifactor Authentication12m
Certificates3m
LDAP3m
RADIUS1m
Kerberos7m
TACACS+1m
Single Sign-On3m
Rob Path to IT1m
Authorization and Access Control Methods1m
Access Control5m
Access Control List1m
Tracking Usage and Access3m
Rob Important Skills in Security1m
2 Lektüren
Supplemental Reading for Authentication10m
Supplemental Reading for Authorization10m
3 praktische Übungen
Authentication26m
Authorization and Accounting6m
AAA Security (Not Roadside Assistance)22m
Woche
4
4 Stunden zum Abschließen

Securing Your Networks

In the fourth week of this course, we'll learn about secure network architecture. It's important to know how to implement security measures on a network environment, so we'll show you some of the best practices to protect an organization's network. We'll learn about some of the risks of wireless networks and how to mitigate them. We'll also cover ways to monitor network traffic and read packet captures. By the end of this module, you'll understand how VPNs, proxies and reverse proxies work; why 802.1X is a super important for network protection; understand why WPA/WPA2 is better than WEP; and know how to use tcpdump to capture and analyze packets on a network. That's a lot of information, but well worth it for an IT Support Specialist to understand! ...
11 Videos (Gesamt 70 min), 7 Lektüren, 5 Quiz
11 Videos
Network Hardware Hardening9m
Network Software Hardening5m
Joe Personal Obstacle44
WEP Encryption and Why You Shouldn't Use It8m
Let's Get Rid of WEP! WPA/WPA214m
Wireless Hardening3m
Heather Social Engineering1m
Sniffing the Network5m
Wireshark and tcpdump6m
Intrusion Detection/Prevention Systems6m
7 Lektüren
Supplemental Reading for Network Hardening Best Practices10m
Supplemental Reading on IEEE 802.1X10m
Supplementary reading on HAProxy, nginx and Apache HTTP server10m
Supplementary reading for WEP Encryption and Why You Shouldn't Use It10m
Supplementary reading on WiFi Protected Setup (WPS) PIN brute force vulnerability10m
Supplemental Reading for Promiscuous Mode10m
Supplemental reading for Intrusion Detection/Prevention System10m
4 praktische Übungen
Secure Network Architecture14m
Wireless Security8m
Network Monitoring10m
Week Four Practice Quiz34m
Woche
5
2 Stunden zum Abschließen

Defense in Depth

In the fifth week of this course, we're going to go more in-depth into security defense. We'll cover ways to implement methods for system hardening, application hardening, and determine the policies for OS security. By the end of this module, you'll know why it's important to disable unnecessary components of a system, learn about host-based firewalls, setup anti-malware protection, implement disk encryption, and configure software patch management and application policies. ...
12 Videos (Gesamt 54 min), 3 Lektüren, 4 Quiz
12 Videos
Disabling Unnecessary Components4m
Host-Based Firewall4m
Logging and Auditing7m
Antimalware Protection7m
Disk Encryption6m
Heather Self Learning1m
Software Patch Management6m
Application Policies4m
The Security Principles of Chrome OS3m
Chrome OS Verified Boot3m
Chrome OS Data Encryption2m
3 Lektüren
Supplemental Reading for Logging and Auditing10m
Supplemental Readings for Antimalware Protection10m
Supplemental Reading for Disk Ecryption10m
4 praktische Übungen
System Hardening20m
Application Hardening4m
Defense in Depth16m
Formative Quiz - Chrome OS
Woche
6
4 Stunden zum Abschließen

Creating a Company Culture for Security

Congratulations, you've made it to the final week in the course! In the last week of this course, we'll explore ways to create a company culture for security. It's important for any tech role to determine appropriate measures to meet the three goals of security. By the end of this module, you will develop a security plan for an organization to demonstrate the skills you've learned in this course. You're almost done, keep up the great work! ...
14 Videos (Gesamt 54 min), 4 Lektüren, 5 Quiz
14 Videos
Measuring and Assessing Risk5m
Privacy Policy3m
User Habits6m
Third-Party Security4m
Security Training3m
Alex Grit Story1m
Incident Reporting and Analysis6m
Incident Response and Recovery6m
Interview Role Play: Security4m
Amir Interview1m
Ari Interview1m
Final Assessment32
Congratulations!51
4 Lektüren
Supplemental Reading for Risk in the Workplace10m
Supplemental Reading for User Habits10m
Supplemental Reading for Vendor Security Assessment Questionnaires10m
Final Project - Sample Submission10m
4 praktische Übungen
Risk in the Workplace10m
Users4m
Incident Handling4m
Creating a Company Culture for Security22m
4.8
384 BewertungenChevron Right

Top-Bewertungen

von DSApr 26th 2018

Great course that is full of useful information and presented in an easy to understand way. It's an awesome beginner course that will add to your knowledge and further your knowledge of IT security.

von DSAug 17th 2018

This course was insane, all the possibilities, the potential for growth, and the different ways to help protect against cyber attacks. It was truly an eye-opening lesson in security. Thank you.

Dozent

Über Google

The IT Support Professional Certificate program is part of Grow with Google, an initiative that draws on Google's 20-year history of building products, platforms, and services that help people and businesses grow. Through programs like these, we aim to help everyone– those who make up the workforce of today and the students who will drive the workforce of tomorrow – access the best of Google’s training and tools to grow their skills, careers, and businesses....

Über die Spezialisierung Zertifikat über berufliche Qualifikation für Google IT-Support

This five-course certificate, developed by Google, includes innovative curriculum designed to prepare you for an entry-level role in IT support. A job in IT can mean in-person or remote help desk work in a small business or at a global company like Google. If you’ve been tinkering with IT or are new to the field, you’re at the right place. The program is part of Grow with Google, a Google initiative to help create economic opportunities for all Americans. Check out this video to learn more. Upon completion of the certificate, you can share your information with top employers like Cognizant, GE Digital, H&R Block, Hulu, J.M. Smucker, Infosys, Intel, KForce, MCPc, PNC Bank, RICOH USA, Sprint, TEKSystems, UPMC, Veterans United Home Loans, Walmart and their subsidiaries, and of course, Google. Through a mix of video lectures, quizzes, and hand-on labs and widgets, the program will introduce you to troubleshooting and customer service, networking, operating systems, system administration and security. Along the way, you’ll hear from Googlers with unique backgrounds whose own foundation in IT support served as a jumping off point for their careers. By dedicating 8-10 hours a week, you can complete the certificate in about eight months. You can skip through content that you might already know and speed ahead to the graded assessments. The content in the Google IT Support Professional Certificate is licensed under a Creative Commons Attribution 4.0 International License....
Zertifikat über berufliche Qualifikation für Google IT-Support

Häufig gestellte Fragen

  • Sobald Sie sich für ein Zertifikat angemeldet haben, haben Sie Zugriff auf alle Videos, Quizspiele und Programmieraufgaben (falls zutreffend). Aufgaben, die von anderen Kursteilnehmern bewertet werden, können erst dann eingereicht und überprüft werden, wenn Ihr Unterricht begonnen hat. Wenn Sie sich den Kurs anschauen möchten, ohne ihn zu kaufen, können Sie womöglich auf bestimmte Aufgaben nicht zugreifen.

  • Wenn Sie sich für den Kurs anmelden, erhalten Sie Zugriff auf alle Kurse des Zertifikats und Sie erhalten nach Abschluss aller Arbeiten ein Zertifikat. Ihr elektronisches Zertifikat wird zu Ihrer Seite „Errungenschaften“ hinzugefügt – von dort können Sie Ihr Zertifikat ausdrucken oder es zu Ihrem LinkedIn-Profil hinzufügen. Wenn Sie lediglich den Inhalt des Kurses lesen und anzeigen möchten, können Sie kostenlos als Gast an dem Kurs teilnehmen.

Haben Sie weitere Fragen? Besuchen Sie das Hilfe-Center für Teiln..