Über diesen Kurs

1,115,257 kürzliche Aufrufe
Zertifikat zur Vorlage
Erhalten Sie nach Abschluss ein Zertifikat
100 % online
Beginnen Sie sofort und lernen Sie in Ihrem eigenen Tempo.
Flexible Fristen
Setzen Sie Fristen gemäß Ihrem Zeitplan zurück.
Stufe „Anfänger“
Ca. 29 Stunden zum Abschließen
Englisch
Untertitel: Englisch, Spanisch, Portugiesisch (Brasilien), Arabischer Raum

Kompetenzen, die Sie erwerben

CybersecurityWireless SecurityCryptographyNetwork Security
Zertifikat zur Vorlage
Erhalten Sie nach Abschluss ein Zertifikat
100 % online
Beginnen Sie sofort und lernen Sie in Ihrem eigenen Tempo.
Flexible Fristen
Setzen Sie Fristen gemäß Ihrem Zeitplan zurück.
Stufe „Anfänger“
Ca. 29 Stunden zum Abschließen
Englisch
Untertitel: Englisch, Spanisch, Portugiesisch (Brasilien), Arabischer Raum

Dozent

von

Google-Logo

Google

Lehrplan - Was Sie in diesem Kurs lernen werden

InhaltsbewertungThumbs Up97%(43,134 Bewertungen)Info
Woche
1

Woche 1

5 Stunden zum Abschließen

Understanding Security Threats

5 Stunden zum Abschließen
10 Videos (Gesamt 36 min), 7 Lektüren, 4 Quiz
10 Videos
The CIA Triad2m
Essential Security Terms4m
Malicious Software5m
Malware Continued2m
Network Attacks3m
Denial-of-Service3m
Client-Side Attacks2m
Password Attacks2m
Deceptive Attacks3m
7 Lektüren
Navigating Coursera10m
Program Surveys10m
How to Use Discussion Forums10m
Get to Know Your Classmates10m
Supplemental Reading for Malicious Software10m
Supplemental Reading for Network Attacks10m
Supplemental Reading for DDoS Attacks10m
4 praktische Übungen
Malicious Software30m
Network Attacks30m
Other Attacks30m
Understanding Security Threats1h 5m
Woche
2

Woche 2

7 Stunden zum Abschließen

Pelcgbybtl (Cryptology)

7 Stunden zum Abschließen
13 Videos (Gesamt 82 min), 9 Lektüren, 7 Quiz
13 Videos
Symmetric Cryptography5m
Symmetric Encryption Algorithms9m
Rob What a Security Engineer Does1m
Asymmetric Cryptography7m
Asymmetric Encryption Algorithms5m
Hashing3m
Hashing Algorithms5m
Hashing Algorithms (continued)5m
Public Key Infrastructure9m
Cryptography in Action8m
Securing Network Traffic6m
Cryptographic Hardware6m
9 Lektüren
Supplemental Reading for The Future of Cryptanalysis10m
Supplemental Reading for Symmetric Encryptions10m
Supplemental Reading for Asymmetric Encryption Attack10m
Supplemental Reading for SHA1 Attacks10m
Supplemental Reading for the X.509 Standard10m
Supplemental Reading for PGP10m
Supplemental Reading for Securing Network Traffic10m
Supplemental Reading for TPM Attacks10m
Instructions for Accessing Linux and Windows Qwiklabs10m
5 praktische Übungen
Symmetric Encryption30m
Public Key or Asymmetric Encryption30m
Hashing30m
Cryptography Applications30m
Week Two Practice Quiz30m
Woche
3

Woche 3

3 Stunden zum Abschließen

AAA Security (Not Roadside Assistance)

3 Stunden zum Abschließen
14 Videos (Gesamt 55 min), 2 Lektüren, 3 Quiz
14 Videos
Multifactor Authentication12m
Certificates3m
LDAP3m
RADIUS1m
Kerberos7m
TACACS+1m
Single Sign-On3m
Rob Path to IT1m
Authorization and Access Control Methods1m
Access Control5m
Access Control List1m
Tracking Usage and Access3m
Rob Important Skills in Security1m
2 Lektüren
Supplemental Reading for Authentication10m
Supplemental Reading for Authorization10m
3 praktische Übungen
Authentication30m
Authorization and Accounting30m
AAA Security (Not Roadside Assistance)55m
Woche
4

Woche 4

5 Stunden zum Abschließen

Securing Your Networks

5 Stunden zum Abschließen
11 Videos (Gesamt 70 min), 7 Lektüren, 5 Quiz
11 Videos
Network Hardware Hardening9m
Network Software Hardening5m
Joe Personal Obstacle44
WEP Encryption and Why You Shouldn't Use It8m
Let's Get Rid of WEP! WPA/WPA214m
Wireless Hardening3m
Heather Social Engineering1m
Sniffing the Network5m
Wireshark and tcpdump6m
Intrusion Detection/Prevention Systems6m
7 Lektüren
Supplemental Reading for Network Hardening Best Practices10m
Supplemental Reading on IEEE 802.1X10m
Supplementary reading on HAProxy, nginx and Apache HTTP server10m
Supplementary reading for WEP Encryption and Why You Shouldn't Use It10m
Supplementary reading on WiFi Protected Setup (WPS) PIN brute force vulnerability10m
Supplemental Reading for Promiscuous Mode10m
Supplemental reading for Intrusion Detection/Prevention System10m
4 praktische Übungen
Secure Network Architecture30m
Wireless Security30m
Network Monitoring30m
Week Four Practice Quiz30m

Bewertungen

Top-Bewertungen von IT SECURITY: DEFENSE AGAINST THE DIGITAL DARK ARTS

Alle Bewertungen anzeigen

Häufig gestellte Fragen

  • Access to lectures and assignments depends on your type of enrollment. If you take a course in audit mode, you will be able to see most course materials for free. To access graded assignments and to earn a Certificate, you will need to purchase the Certificate experience, during or after your audit. If you don't see the audit option:

    • The course may not offer an audit option. You can try a Free Trial instead, or apply for Financial Aid.

    • The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.

  • When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

  • If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.

Haben Sie weitere Fragen? Besuchen Sie das Hilfe-Center für Teiln..