About this Course
366,231 recent views

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Beginner Level

Approx. 19 hours to complete

Suggested: 10 hours/week...

English

Subtitles: English, Spanish, Portuguese (Brazilian), Arabic

Skills you will gain

CybersecurityWireless SecurityCryptographyNetwork Security

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Beginner Level

Approx. 19 hours to complete

Suggested: 10 hours/week...

English

Subtitles: English, Spanish, Portuguese (Brazilian), Arabic

Syllabus - What you will learn from this course

Week
1
3 hours to complete

Understanding Security Threats

10 videos (Total 36 min), 7 readings, 4 quizzes
10 videos
The CIA Triad2m
Essential Security Terms4m
Malicious Software5m
Malware Continued2m
Network Attacks3m
Denial-of-Service3m
Client-Side Attacks2m
Password Attacks2m
Deceptive Attacks3m
7 readings
Navigating Coursera10m
Program Surveys10m
How to Use Discussion Forums10m
Get to Know Your Classmates10m
Supplemental Reading for Malicious Software10m
Supplemental Reading for Network Attacks10m
Supplemental Reading for DDoS Attacks10m
4 practice exercises
Malicious Software14m
Network Attacks8m
Other Attacks6m
Understanding Security Threats1h 5m
Week
2
6 hours to complete

Pelcgbybtl (Cryptology)

13 videos (Total 82 min), 9 readings, 7 quizzes
13 videos
Symmetric Cryptography5m
Symmetric Encryption Algorithms9m
Rob What a Security Engineer Does1m
Asymmetric Cryptography7m
Asymmetric Encryption Algorithms5m
Hashing3m
Hashing Algorithms5m
Hashing Algorithms (continued)5m
Public Key Infrastructure9m
Cryptography in Action8m
Securing Network Traffic6m
Cryptographic Hardware6m
9 readings
Supplemental Reading for The Future of Cryptanalysis10m
Supplemental Reading for Symmetric Encryptions10m
Supplemental Reading for Asymmetric Encryption Attack10m
Supplemental Reading for SHA1 Attacks10m
Supplemental Reading for the X.509 Standard10m
Supplemental Reading for PGP10m
Supplemental Reading for Securing Network Traffic10m
Supplemental Reading for TPM Attacks10m
Instructions for Accessing Linux and Windows Qwiklabs10m
5 practice exercises
Symmetric Encryption10m
Public Key or Asymmetric Encryption6m
Hashing8m
Cryptography Applications6m
Week Two Practice Quiz28m
Week
3
3 hours to complete

AAA Security (Not Roadside Assistance)

14 videos (Total 55 min), 2 readings, 3 quizzes
14 videos
Multifactor Authentication12m
Certificates3m
LDAP3m
RADIUS1m
Kerberos7m
TACACS+1m
Single Sign-On3m
Rob Path to IT1m
Authorization and Access Control Methods1m
Access Control5m
Access Control List1m
Tracking Usage and Access3m
Rob Important Skills in Security1m
2 readings
Supplemental Reading for Authentication10m
Supplemental Reading for Authorization10m
3 practice exercises
Authentication26m
Authorization and Accounting6m
AAA Security (Not Roadside Assistance)55m
Week
4
4 hours to complete

Securing Your Networks

11 videos (Total 70 min), 7 readings, 5 quizzes
11 videos
Network Hardware Hardening9m
Network Software Hardening5m
Joe Personal Obstacle44s
WEP Encryption and Why You Shouldn't Use It8m
Let's Get Rid of WEP! WPA/WPA214m
Wireless Hardening3m
Heather Social Engineering1m
Sniffing the Network5m
Wireshark and tcpdump6m
Intrusion Detection/Prevention Systems6m
7 readings
Supplemental Reading for Network Hardening Best Practices10m
Supplemental Reading on IEEE 802.1X10m
Supplementary reading on HAProxy, nginx and Apache HTTP server10m
Supplementary reading for WEP Encryption and Why You Shouldn't Use It10m
Supplementary reading on WiFi Protected Setup (WPS) PIN brute force vulnerability10m
Supplemental Reading for Promiscuous Mode10m
Supplemental reading for Intrusion Detection/Prevention System10m
4 practice exercises
Secure Network Architecture14m
Wireless Security8m
Network Monitoring10m
Week Four Practice Quiz34m
4.8
572 ReviewsChevron Right

Top reviews from IT Security: Defense against the digital dark arts

By DSApr 26th 2018

Great course that is full of useful information and presented in an easy to understand way. It's an awesome beginner course that will add to your knowledge and further your knowledge of IT security.

By DSAug 17th 2018

This course was insane, all the possibilities, the potential for growth, and the different ways to help protect against cyber attacks. It was truly an eye-opening lesson in security. Thank you.

Instructor

About Google

The IT Support Professional Certificate program is part of Grow with Google, an initiative that draws on Google's 20-year history of building products, platforms, and services that help people and businesses grow. Through programs like these, we aim to help everyone– those who make up the workforce of today and the students who will drive the workforce of tomorrow – access the best of Google’s training and tools to grow their skills, careers, and businesses....

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.