Chevron Left
Back to IT Security: Defense against the digital dark arts

Learner Reviews & Feedback for IT Security: Defense against the digital dark arts by Google

4.8
stars
13,558 ratings
2,321 reviews

About the Course

This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team. At the end of this course, you’ll understand: ● how various encryption algorithms and techniques work as well as their benefits and limitations. ● various authentication systems and types. ● the difference between authentication and authorization. ● how to evaluate potential risks and recommend ways to reduce risk. ● best practices for securing a network. ● how to help others to grasp security concepts and protect themselves....

Top reviews

DS
Apr 25, 2018

Great course that is full of useful information and presented in an easy to understand way. It's an awesome beginner course that will add to your knowledge and further your knowledge of IT security.

DG
Dec 4, 2020

An absolutely engaging and challenging feat that I am so proud to have completed. I hope this opens new door and better job opportunities so that I can better enhance my future. Thank you Google :)

Filter by:

2151 - 2175 of 2,334 Reviews for IT Security: Defense against the digital dark arts

By Andre C

Jan 18, 2021

Very dense material but a great course to get started with IT security.

By kusum k

Sep 15, 2020

You give me the coincidence and courage to find a suitable job for me.

By ABIJITH.A

Jun 18, 2020

I had fun in learning this course, but few concept were out of my mind

By pramod k J S s

May 23, 2021

Good - provide overall view of current technologies used in industry.

By GERSON F R

Feb 5, 2019

very informative and makes you think about security in a everyday way

By Kevin T

Jun 10, 2018

hit all the points, some more labs with security tools can be useful.

By Oscar P

Aug 20, 2019

Last assignment was confusing and there is no place to upload it to.

By Eric A

Mar 21, 2019

I hope in the future they'll include some Qwik lab in these module.

By John S

Nov 5, 2020

I enjoyed this section a lot and it was very fun and interesting.

By Christopher M

Jun 18, 2018

Challenging but enjoyed learning in depth about network security.

By tejbahadur

Feb 20, 2019

course is informative. I can use it for my daily life even after

By Dave B

Aug 23, 2020

Good content and the instructor was actually funny. (kind of.)

By Robert S L

Oct 1, 2018

Interesting course as an Intro for various technical concepts.

By Ury

Jun 29, 2020

difficult and required a lot more patient. but good content

By Renuka P

Apr 26, 2020

it was good, more hands-on session will add into the course

By Anthony T D

Feb 8, 2019

Tough last project, but other than that, exceptional course

By Cesar R M C

Jun 26, 2019

Definitely worth taking. It's challenging and achievable.

By SHIVAM T

Aug 2, 2020

It is a good course for having a hands on experience :D

By BENJAMIN K A

Jul 21, 2021

The goal for this course was well achieved, thank you.

By Onthatile T

Dec 11, 2020

All the necessary skills i needed i acquired them here

By Ranjoy S R

Jul 9, 2020

Could be better if there were more hands-on exercises.

By Luís C

May 2, 2020

Very interesting course with full of isefull subjects

By Naung Y O

Feb 10, 2019

I can't even imagine how harder in the real world.

By Harrison H

Nov 11, 2018

Peer-reviewed assignments will be the death of me

By Lee W

Jul 16, 2020

Good overview of security for computer systems.