About this Course

1,430,777 recent views
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 29 hours to complete
English

Skills you will gain

CybersecurityWireless SecurityCryptographyNetwork Security
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 29 hours to complete
English

Instructor

Offered by

Placeholder

Google

Syllabus - What you will learn from this course

Content RatingThumbs Up97%(64,302 ratings)Info
Week
1

Week 1

5 hours to complete

Understanding Security Threats

5 hours to complete
10 videos (Total 36 min), 7 readings, 4 quizzes
10 videos
The CIA Triad2m
Essential Security Terms4m
Malicious Software5m
Malware Continued2m
Network Attacks3m
Denial-of-Service3m
Client-Side Attacks2m
Password Attacks2m
Deceptive Attacks3m
7 readings
Navigating Coursera10m
Program Surveys10m
How to Use Discussion Forums10m
Get to Know Your Classmates10m
Supplemental Reading for Malicious Software10m
Supplemental Reading for Network Attacks10m
Supplemental Reading for DDoS Attacks10m
4 practice exercises
Malicious Software30m
Network Attacks30m
Other Attacks30m
Understanding Security Threats1h 5m
Week
2

Week 2

7 hours to complete

Pelcgbybtl (Cryptology)

7 hours to complete
14 videos (Total 83 min), 9 readings, 7 quizzes
14 videos
Symmetric Cryptography5m
Symmetric Encryption Algorithms9m
Rob What a Security Engineer Does1m
Asymmetric Cryptography7m
Asymmetric Encryption Algorithms5m
Hashing3m
Hashing Algorithms5m
Hashing Algorithms (continued)5m
Public Key Infrastructure9m
Cryptography in Action8m
Securing Network Traffic6m
Cryptographic Hardware6m
Rejection36s
9 readings
Supplemental Reading for The Future of Cryptanalysis10m
Supplemental Reading for Symmetric Encryptions10m
Supplemental Reading for Asymmetric Encryption Attack10m
Supplemental Reading for SHA1 Attacks10m
Supplemental Reading for the X.509 Standard10m
Supplemental Reading for PGP10m
Supplemental Reading for Securing Network Traffic10m
Supplemental Reading for TPM Attacks10m
Instructions for Accessing Linux and Windows Qwiklabs10m
5 practice exercises
Symmetric Encryption30m
Public Key or Asymmetric Encryption30m
Hashing30m
Cryptography Applications30m
Week Two Practice Quiz30m
Week
3

Week 3

3 hours to complete

AAA Security (Not Roadside Assistance)

3 hours to complete
14 videos (Total 55 min), 2 readings, 3 quizzes
14 videos
Multifactor Authentication12m
Certificates3m
LDAP3m
RADIUS1m
Kerberos7m
TACACS+1m
Single Sign-On3m
Rob Path to IT1m
Authorization and Access Control Methods1m
Access Control5m
Access Control List1m
Tracking Usage and Access3m
Rob Important Skills in Security1m
2 readings
Supplemental Reading for Authentication10m
Supplemental Reading for Authorization10m
3 practice exercises
Authentication30m
Authorization and Accounting30m
AAA Security (Not Roadside Assistance)55m
Week
4

Week 4

5 hours to complete

Securing Your Networks

5 hours to complete
11 videos (Total 70 min), 7 readings, 5 quizzes
11 videos
Network Hardware Hardening9m
Network Software Hardening5m
Joe Personal Obstacle44s
WEP Encryption and Why You Shouldn't Use It8m
Let's Get Rid of WEP! WPA/WPA214m
Wireless Hardening3m
Heather Social Engineering1m
Sniffing the Network5m
Wireshark and tcpdump6m
Intrusion Detection/Prevention Systems6m
7 readings
Supplemental Reading for Network Hardening Best Practices10m
Supplemental Reading on IEEE 802.1X10m
Supplementary reading on HAProxy, nginx and Apache HTTP server10m
Supplementary reading for WEP Encryption and Why You Shouldn't Use It10m
Supplementary reading on WiFi Protected Setup (WPS) PIN brute force vulnerability10m
Supplemental Reading for Promiscuous Mode10m
Supplemental reading for Intrusion Detection/Prevention System10m
4 practice exercises
Secure Network Architecture30m
Wireless Security30m
Network Monitoring30m
Week Four Practice Quiz30m

Reviews

TOP REVIEWS FROM IT SECURITY: DEFENSE AGAINST THE DIGITAL DARK ARTS

View all reviews

Frequently Asked Questions

More questions? Visit the Learner Help Center.