Explore
Online Degrees
Degrees
Online Degree
Explore Bachelor’s & Master’s degrees
MasterTrack™
Earn credit towards a Master’s degree
University Certificates
Advance your career with graduate-level learning
Find your New Career
For Enterprise
For Universities
Browse
Top Courses
Log In
Join for Free
List
Directory
Search for:
Master's Degrees
MasterTracks®
Professional Certificates
Specializations
Courses
Partners
Instructors
Topics
Videos
Queries
Collections
Course Reviews
Videos
Course: IT Security: Defense against the digital dark arts . Click
here
to go back.
Course Introduction
The CIA Triad
Essential Security Terms
Malicious Software
Malware Continued
Network Attacks
Denial-of-Service
Client-Side Attacks
Password Attacks
Deceptive Attacks
Cryptography
Symmetric Cryptography
Symmetric Encryption Algorithms
Rob: The work of a security engineer
Asymmetric Cryptography
Symmetric Cryptography
Asymmetric Encryption Algorithms
Hashing
Hashing Algorithms
Hashing Algorithms (continued)
Public Key Infrastructure
Certificates
Cryptography in Action
Securing Network Traffic
Cryptographic Hardware
Rejection
Best practices for authentication
Multifactor Authentication
Multifactor Authentication Options
Certificates
RADIUS
Kerberos
TACACS+
Single Sign-On
Rob: My path to IT
Authorization and Access Control Methods
Access Control
Access Control List
Tracking Usage and Access
Rob: Important skills in security
Network Hardening Best Practices
Network Hardware Hardening
Network Software Hardening
Joe: My personal obstacle
WEP Encryption and Why You Shouldn't Use It
Let's Get Rid of WEP!
WEP2
Wireless Hardening
Heather: The impact of social engineering
Sniffing the Network
Wireshark and tcpdump
Intrusion Detection/Prevention Systems
Intro to Defense in Depth
Disabling Unnecessary Components
Host-Based Firewall
Logging and Auditing
Antimalware Protection
Disk Encryption
Heather: Self-learning is the key to success
Software Patch Management
Application Policies
Security Goals
Measuring and Assessing Risk
Privacy Policy
User Habits
Third-Party Security
Security Training
Alex: Qualities of an IT candidate
Incident Reporting and Analysis
Incident Response and Recovery
Mobile Security and Privacy
Amir: Tips for interviews
Ari: Tips for interviews
Interview Role Play: Security
Final Assessment
Framing yourself
Congratulations!