The course is designed to equip learners with the necessary knowledge and skills to defend against various digital threats and cyberattacks. Covering a range of topics, the course delves into key areas such as network security, cryptography, secure coding practices, and incident response.
Learners are introduced to fundamental concepts related to securing computer networks, understanding vulnerabilities, and implementing protective measures. They explore encryption techniques, authentication protocols, and methods to ensure data confidentiality and integrity. The course also emphasizes the importance of secure coding practices to prevent common vulnerabilities that could be exploited by attackers.
Furthermore, the course equips participants with insights into the evolving landscape of cybersecurity threats and trends. It highlights the significance of staying up-to-date with emerging attack vectors and techniques used by malicious actors. Through hands-on exercises and practical examples, learners gain the experience needed to identify, assess, and respond to security incidents effectively.
By the end of the course, participants will have a solid foundation in IT security principles and practices, enabling them to better protect digital assets, maintain the integrity of systems, and contribute to safeguarding sensitive information in both personal and professional contexts.
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.
The course IT Security: Defense against the Digital Dark Arts by Google Career Certificates on Coursera is divided into 7 modules. Here is a detailed breakdown of the modules:
Module 1: Understanding Security Threats
Welcome to the IT Security course of the IT Support Professional Certificate! In the first week of this course, we will cover the basics of security in an IT environment. We will learn how to define and recognize security risks, vulnerabilities and threats. We'll identify the most common security attacks in an organization and understand how security revolves around the "CIA" principle. By the end of this module, you will know the types of malicious software, network attacks, client-side attacks, and the essential security terms you'll see in the workplace.
10 videos 10 readings 4 quizzes
10 videosTotal 32 minutes
- Course IntroductionPreview module 5 minutes
- The CIA Triad 2 minutes
- Essential Security Terms 3 minutes
- Malicious Software 4 minutes
- Malware Continued 2 minutes
- Network Attacks 3 minutes
- Denial-of-Service 3 minutes
- Client-Side Attacks 2 minutes
- Password Attacks 2 minutes
- Deceptive Attacks 3 minutes
10 readingsTotal 100 minutes
- Navigating Coursera 10 minutes
- How to Use Discussion Forums 10 minutes
- Get to Know Your Classmates 10 minutes
- Antimalware Protection, Malware Removal 10 minutes
- Supplemental Reading for Malicious Software 10 minutes
- Supplemental Reading for Network Attacks 10 minutes
- Supplemental Reading for DDoS Attacks 10 minutes
- Deceptive Attacks 10 minutes
- Physical Security 10 minutes
- Module 1 Glossary 10 minutes
4 quizzesTotal 93 minutes
- Understanding Security Threats 65 minutes
- Malicious Software 14 minutes
- Network Attacks 8 minutes
- Other Attacks 6 minutes
Module 2: Pelcgbybtl (Cryptology)
In the second week of this course, we'll learn about cryptology. We'll explore different types of encryption practices and how they work. We'll show you the most common algorithms used in cryptography and how they've evolved over time. By the end of this module, you'll understand how symmetric encryption, asymmetric encryption, and hashing work; you'll also know how to choose the most appropriate cryptographic method for a scenario you may see in the workplace.
16 videos 10 readings 5 quizzes
16 videosTotal 75 minutes
- CryptographyPreview module 7 minutes
- Symmetric Cryptography 4 minutes
- Symmetric Encryption Algorithms 7 minutes
- Rob: The work of a security engineer 1 minute
- Asymmetric Cryptography 3 minutes
- Symmetric Cryptography, Part Two 3 minutes
- Asymmetric Encryption Algorithms 5 minutes
- Hashing 3 minutes
- Hashing Algorithms 4 minutes
- Hashing Algorithms (continued) 5 minutes
- Public Key Infrastructure 5 minutes
- Certificates 3 minutes
- Cryptography in Action 8 minutes
- Securing Network Traffic 5 minutes
- Cryptographic Hardware 6 minutes
- Rejection 0 minutes
10 readingsTotal 100 minutes
- Supplemental Reading for The Future of Cryptanalysis 10 minutes
- Supplemental Reading for Symmetric Encryptions 10 minutes
- Supplemental Reading for Asymmetric Encryption Attack 10 minutes
- Supplemental Reading for SHA1 Attacks 10 minutes
- Supplemental Reading for the X.509 Standard 10 minutes
- Supplemental Reading for PGP 10 minutes
- Supplemental Reading for Securing Network Traffic 10 minutes
- Supplemental Reading for TPM Attacks 10 minutes
- Module 2 Glossary 10 minutes
- Qwiklabs Introduction 10 minutes
5 quizzesTotal 58 minutes
- Symmetric Encryption 10 minutes
- Public Key or Asymmetric Encryption 6 minutes
- Hashing 8 minutes
- Cryptography Applications 6 minutes
- Pelcgbybtl (Cryptology) 28 minutes
Module 3: The 3 A's of Cybersecurity: Authentication, Authorization, Accounting
In the third week of this course, we'll learn about the "three A's" in cybersecurity. No matter what type of tech role you're in, it's important to understand how authentication, authorization, and accounting work within an organization. By the end of this module, you'll be able to choose the most appropriate method of authentication, authorization, and level of access granted for users in an organization.
14 videos 5 readings 3 quizzes
14 videosTotal 46 minutes
- Best practices for authenticationPreview module 6 minutes
- Multifactor Authentication 5 minutes
- Multifactor Authentication Options 5 minutes
- Certificates, Part Two 3 minutes
- RADIUS 1 minute
- Kerberos 7 minutes
- TACACS+ 1 minute
- Single Sign-On 3 minutes
- Rob: My path to IT 1 minute
- Authorization and Access Control Methods 1 minute
- Access Control 4 minutes
- Access Control List 1 minute
- Tracking Usage and Access 2 minutes
- Rob: Important skills in security 1 minute
5 readingsTotal 50 minutes
- Physical Privacy and Security Components 10 minutes
- Supplemental Reading for Authentication 10 minutes
- Mobile Security Methods 10 minutes
- Supplemental Reading for Authorization 10 minutes
- Module 3 Glossary 10 minutes
3 quizzesTotal 87 minutes
- Authentication, Authorization, Accounting Quiz 55 minutes
- Authentication 26 minutes
- Authorization and Accounting 6 minutes
Module 4: Securing Your Networks
In the fourth week of this course, we'll learn about secure network architecture. It's important to know how to implement security measures on a network environment, so we'll show you some of the best practices to protect an organization's network. We'll learn about some of the risks of wireless networks and how to mitigate them. We'll also cover ways to monitor network traffic and read packet captures. By the end of this module, you'll understand how VPNs, proxies and reverse proxies work; why 802.1X is a super important for network protection; understand why WPA/WPA2 is better than WEP; and know how to use tcpdump to capture and analyze packets on a network. That's a lot of information, but well worth it for an IT Support Specialist to understand!
12 videos 10 readings 4 quizzes
12 videosTotal 63 minutes
- Network Hardening Best PracticesPreview module 8 minutes
- Network Hardware Hardening 8 minutes
- Network Software Hardening 4 minutes
- Joe: My personal obstacle 0 minutes
- WEP Encryption and Why You Shouldn't Use It 7 minutes
- Let's Get Rid of WEP! 6 minutes
- WPA2 6 minutes
- Wireless Hardening 2 minutes
- Heather: The impact of social engineering 1 minute
- Sniffing the Network 4 minutes
- Wireshark and tcpdump 6 minutes
- Intrusion Detection/Prevention Systems 6 minutes
10 readingsTotal 100 minutes
- Supplemental Reading for Network Hardening Best Practices 10 minutes
- Supplemental Reading on IEEE 802.1X 10 minutes
- Supplementary reading on HAProxy, nginx and Apache HTTP server 10 minutes
- Supplementary reading for WEP Encryption and Why You Shouldn't Use It 10 minutes
- Supplementary reading on WiFi Protected Setup (WPS) PIN brute force vulnerability 10 minutes
- Supplemental Reading for Promiscuous Mode 10 minutes
- Supplemental reading for Intrusion Detection/Prevention System 10 minutes
- Unified Threat Management (UTM) 10 minutes
- Home Network Security 10 minutes
- Module 4 Glossary 10 minutes
4 quizzesTotal 66 minutes
- Secure Network Architecture 14 minutes
- Wireless Security 8 minutes
- Network Monitoring 10 minutes
- Securing Your Networks 34 minutes
Module 5: Defense in Depth
In the fifth week of this course, we're going to go more in-depth into security defense. We'll cover ways to implement methods for system hardening, application hardening, and determine the policies for OS security. By the end of this module, you'll know why it's important to disable unnecessary components of a system, learn about host-based firewalls, setup anti-malware protection, implement disk encryption, and configure software patch management and application policies.
9 videos 6 readings 3 quizzes
9 videosTotal 41 minutes
- Intro to Defense in DepthPreview module 1 minute
- Disabling Unnecessary Components 4 minutes
- Host-Based Firewall 4 minutes
- Logging and Auditing 6 minutes
- Antimalware Protection 7 minutes
- Disk Encryption 6 minutes
- Heather: Self-learning is the key to success 1 minute
- Software Patch Management 6 minutes
- Application Policies 3 minutes
6 readingsTotal 60 minutes
- Supplemental Reading for Logging and Auditing 10 minutes
- Windows Defender Guide 10 minutes
- Supplemental Readings for Antimalware Protection 10 minutes
- Supplemental Reading for Disk Encryption 10 minutes
- Browser Hardening 10 minutes
- Module 5 Glossary 10 minutes
3 quizzesTotal 64 minutes
- Defense in Depth 40 minutes
- System Hardening 20 minutes
- Application Hardening 4 minutes
Module 6: Creating a Company Culture for Security
Congratulations, you've made it to the final week in the course! In the last week of this course, we'll explore ways to create a company culture for security. It's important for any tech role to determine appropriate measures to meet the three goals of security. By the end of this module, you will develop a security plan for an organization to demonstrate the skills you've learned in this course. You're almost done, keep up the great work!
16 videos 14 readings 6 quizzes
16 videosTotal 55 minutes
- Security GoalsPreview module 6 minutes
- Measuring and Assessing Risk 5 minutes
- User Habits 5 minutes
- Third-Party Security 3 minutes
- Security Training 3 minutes
- Alex: Qualities of an IT candidate 1 minute
- Incident Reporting and Analysis 6 minutes
- Incident Response and Recovery 5 minutes
- Mobile Security and Privacy 3 minutes
- Amir: Tips for interviews 1 minute
- Ari: Tips for interviews 1 minute
- Interview Role Play: Security 4 minutes
- Final Assessment 0 minutes
- Framing yourself 1 minute
- Congratulations! 0 minutes
14 readingsTotal 140 minutes
- Supplemental Reading for Risk in the Workplace 10 minutes
- Data Destruction 10 minutes
- Supplemental Reading for User Habits 10 minutes
- Supplemental Reading for Vendor Security Assessment Questionnaires 10 minutes
- Incident Response 10 minutes
- Supplemental Readings for Mobile Security and Privacy 10 minutes
- Bring Your Own Device 10 minutes
- Invitation to Sign Up for Big Interview 10 minutes
- Final Project - Sample Submission 10 minutes
- How to Add Google IT Support Certificate to Your Resume and LinkedIn Profile 10 minutes
- Common Job Search Terms 10 minutes
- Module 6 Glossary 10 minutes
- Course 5 Glossary 10 minutes
- Information and FAQs about badges 10 minutes
6 quizzesTotal 108 minutes
- Creating a Company Culture for Security 55 minutes
- Creating a Company Culture for Security - Design Document 30 minutes
- Risk in the Workplace 10 minutes
- Users 4 minutes
- Incident Handling 4 minutes
- Your Access to Google Job Search Resources 5 minutes
Module 7: Prepare for Jobs in IT Support
You will engage in a series of interactive activities based on concepts you’ve explored and skills you’ve gained throughout the program. You’ll also explore job readiness skills, develop your resume, and practice interviewing for jobs.
As a former learner who has completed the IT Security: Defense against the Digital Dark Arts course offered by Google Career Certificates on Coursera, I am pleased to share my evaluation of the program. This course proved to be an invaluable journey into the realm of cybersecurity, equipping me with essential knowledge and practical skills that have had a profound impact on my understanding of IT security.
The course content was expertly curated, covering a wide range of topics crucial to modern cybersecurity. The material was presented in a well-structured manner, progressively building on foundational concepts before delving into more advanced areas. The inclusion of real-world case studies and examples enriched my learning experience, as they demonstrated the practical application of the theories discussed.
One of the standout aspects of the course was its emphasis on hands-on learning. The interactive exercises and simulations allowed me to engage directly with security tools and techniques, fostering a deeper understanding of how to defend against various digital threats. The practical assignments not only challenged me to apply the concepts I learned but also provided me with a tangible sense of accomplishment upon completion.
The instructors were clearly experts in the field, delivering the content with clarity and enthusiasm. Their ability to convey complex ideas in an accessible manner was truly commendable. Additionally, the discussion forums facilitated meaningful interactions with fellow learners, enabling the exchange of insights, questions, and perspectives that further enriched my understanding.
Furthermore, the course's relevance to real-world scenarios was evident throughout. I appreciated the focus on current cybersecurity challenges and emerging trends, which ensured that I was well-prepared to address contemporary threats. The inclusion of industry best practices and guidance on staying up-to-date with the evolving threat landscape was invaluable.
Upon completing the course, I felt a heightened sense of confidence in my ability to contribute effectively to IT security efforts. The skills I acquired have been instrumental in my professional growth, allowing me to implement secure practices in my organization and enhance the overall cybersecurity posture.
In summary, the IT Security: Defense against the Digital Dark Arts course by Google Career Certificates is a comprehensive and engaging program that offers both theoretical knowledge and practical skills necessary for anyone interested in the field of cybersecurity. The course's structure, hands-on approach, and commitment to real-world relevance make it a standout choice for individuals seeking to fortify their understanding of IT security in today's digital landscape.
What you'll learn:
After completing the IT Security: Defense against the Digital Dark Arts course authored by Google Career Certificates on Coursera, learners will acquire a range of valuable skills in the field of information technology security. These skills include:
Network Security Knowledge: Learners will gain a solid understanding of network security principles, including how to identify vulnerabilities, implement secure configurations, and protect networks from unauthorized access.
Cryptography Expertise: Participants will be well-versed in cryptographic techniques, understanding how encryption and decryption work, and how to use cryptography to secure data and communications.
Secure Coding Practices: The course will equip learners with the ability to implement secure coding practices, ensuring that software and applications are developed with security in mind, reducing the risk of common vulnerabilities.
Incident Response Abilities: Learners will be prepared to effectively respond to security incidents, including identifying the scope of attacks, containing the breach, and initiating recovery processes.
Understanding of Threat Landscape: Participants will be familiar with the evolving threat landscape, recognizing various types of cyberattacks, understanding attacker tactics, techniques, and procedures (TTPs), and staying current with emerging threats.
Authentication and Authorization Skills: Learners will know how to implement strong authentication and authorization mechanisms, ensuring that only authorized individuals have access to systems and resources.
Risk Assessment and Mitigation: The course will provide skills in assessing security risks and implementing strategies to mitigate potential vulnerabilities, helping to safeguard digital assets.
Data Confidentiality and Integrity: Participants will learn how to protect the confidentiality and integrity of sensitive data through encryption, access controls, and data protection measures.
Security Best Practices: Learners will become familiar with industry best practices for maintaining a secure computing environment and staying proactive against potential threats.
Hands-on Experience: Through practical exercises and real-world examples, participants will gain hands-on experience in applying security principles, which will enable them to effectively secure systems and respond to security challenges.
These skills collectively prepare learners to contribute to IT security efforts in various roles, ranging from network administrators and cybersecurity analysts to software developers and IT managers. The course aims to empower individuals with the knowledge and abilities needed to defend against the digital dark arts and protect digital assets in an increasingly interconnected world.
Description of Google Career Certificates:
Google Career Certificates is a comprehensive program offered by Google that provides individuals with practical, job-focused training in various high-demand fields. These certificates are designed to equip learners with the skills they need to enter or advance in specific industries, even if they don't have a traditional college degree. The program aims to bridge the gap between education and employment by offering accessible, affordable, and relevant training that aligns with the needs of today's job market.
The Google Career Certificates cover a range of disciplines, including IT support, data analytics, project management, user experience (UX) design, and more. Each certificate program includes a series of interactive, hands-on modules that are developed in collaboration with industry experts and employers. These modules focus on practical skills, real-world scenarios, and industry-specific tools, ensuring that learners gain relevant experience that can be immediately applied in their chosen field.
Google Career Certificates have garnered significant attention and positive feedback within the education and employment sectors. These certificates are well-regarded for several reasons:
Industry-Relevant Skills: The programs focus on teaching skills that are directly applicable to today's job market, helping individuals develop the practical abilities needed to excel in their chosen field.
Accessibility: The program is accessible to a wide range of learners, irrespective of their educational background. This inclusivity helps address workforce diversity and inclusion challenges.
Affordability: The certificates are priced at a fraction of the cost of a traditional degree, making quality education more accessible and affordable to a broader audience.
Job Placement Support: Google collaborates with employers and industry partners, offering resources for job placement assistance and networking opportunities, potentially improving graduates' chances of finding relevant employment.
Recognized by Industry: Many employers recognize and value Google Career Certificates as indicators of practical skills and job readiness, which can give graduates a competitive edge in the job market.
Flexibility: The online nature of the programs allows learners to study at their own pace and fit their education around their existing commitments.
Positive Impact: Google Career Certificates play a role in addressing the skills gap by training individuals for roles that are in high demand, helping to bridge the gap between education and employment.
Overall, Google Career Certificates are a well-regarded and impactful initiative that contributes to workforce development and provides individuals with a pathway to meaningful and gainful employment in various industries.
The IT Security: Defense against the Digital Dark Arts course, authored by Google Career Certificates, lays out several requirements for participants to successfully engage in and benefit from the program. These requirements include:
Basic Computer Literacy: Participants should possess a fundamental understanding of computer operations, including using operating systems, browsing the internet, and managing files and folders.
Internet Access and Computer Equipment: Learners must have access to a computer or device with a reliable internet connection to access course materials, participate in discussions, and complete assignments.
Language Proficiency: As the course content is delivered in English, a reasonable level of proficiency in the language is essential to comprehend the instructional materials and interact with the course content effectively.
Study Commitment: The course requires a certain time commitment for reading, watching videos, completing assignments, and participating in discussions. Learners should allocate sufficient time to engage with the course content regularly.
Basic Understanding of Networking: While not mandatory, having a basic understanding of networking concepts can be beneficial, as the course covers network security principles and practices.
Problem-Solving Skills: A willingness to engage in critical thinking and problem-solving is crucial, as the course involves identifying security vulnerabilities, analyzing threats, and devising protective strategies.
Motivation and Self-Discipline: Online courses demand self-discipline and motivation to stay on track and complete assignments within specified timeframes.
Comfort with Online Learning Platforms: Participants should be comfortable using online learning platforms, navigating course websites, submitting assignments, and participating in virtual discussions.
Interest in Cybersecurity: While not a strict requirement, a genuine interest in IT security and a desire to learn about protecting digital assets will enhance the learning experience.
Access to Practice Environment (Recommended): Having access to a testing or practice environment where learners can experiment with security tools and concepts can significantly enhance hands-on learning.