About this Course

1,316,256 recent views
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 29 hours to complete
English
Subtitles: English, Spanish, Portuguese (Brazilian), Arabic

Skills you will gain

CybersecurityWireless SecurityCryptographyNetwork Security
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 29 hours to complete
English
Subtitles: English, Spanish, Portuguese (Brazilian), Arabic

Instructor

Offered by

Google logo

Google

Syllabus - What you will learn from this course

Content RatingThumbs Up97%(47,343 ratings)Info
Week
1

Week 1

5 hours to complete

Understanding Security Threats

5 hours to complete
10 videos (Total 36 min), 7 readings, 4 quizzes
10 videos
The CIA Triad2m
Essential Security Terms4m
Malicious Software5m
Malware Continued2m
Network Attacks3m
Denial-of-Service3m
Client-Side Attacks2m
Password Attacks2m
Deceptive Attacks3m
7 readings
Navigating Coursera10m
Program Surveys10m
How to Use Discussion Forums10m
Get to Know Your Classmates10m
Supplemental Reading for Malicious Software10m
Supplemental Reading for Network Attacks10m
Supplemental Reading for DDoS Attacks10m
4 practice exercises
Malicious Software30m
Network Attacks30m
Other Attacks30m
Understanding Security Threats1h 5m
Week
2

Week 2

7 hours to complete

Pelcgbybtl (Cryptology)

7 hours to complete
13 videos (Total 82 min), 9 readings, 7 quizzes
13 videos
Symmetric Cryptography5m
Symmetric Encryption Algorithms9m
Rob What a Security Engineer Does1m
Asymmetric Cryptography7m
Asymmetric Encryption Algorithms5m
Hashing3m
Hashing Algorithms5m
Hashing Algorithms (continued)5m
Public Key Infrastructure9m
Cryptography in Action8m
Securing Network Traffic6m
Cryptographic Hardware6m
9 readings
Supplemental Reading for The Future of Cryptanalysis10m
Supplemental Reading for Symmetric Encryptions10m
Supplemental Reading for Asymmetric Encryption Attack10m
Supplemental Reading for SHA1 Attacks10m
Supplemental Reading for the X.509 Standard10m
Supplemental Reading for PGP10m
Supplemental Reading for Securing Network Traffic10m
Supplemental Reading for TPM Attacks10m
Instructions for Accessing Linux and Windows Qwiklabs10m
5 practice exercises
Symmetric Encryption30m
Public Key or Asymmetric Encryption30m
Hashing30m
Cryptography Applications30m
Week Two Practice Quiz30m
Week
3

Week 3

3 hours to complete

AAA Security (Not Roadside Assistance)

3 hours to complete
14 videos (Total 55 min), 2 readings, 3 quizzes
14 videos
Multifactor Authentication12m
Certificates3m
LDAP3m
RADIUS1m
Kerberos7m
TACACS+1m
Single Sign-On3m
Rob Path to IT1m
Authorization and Access Control Methods1m
Access Control5m
Access Control List1m
Tracking Usage and Access3m
Rob Important Skills in Security1m
2 readings
Supplemental Reading for Authentication10m
Supplemental Reading for Authorization10m
3 practice exercises
Authentication30m
Authorization and Accounting30m
AAA Security (Not Roadside Assistance)55m
Week
4

Week 4

5 hours to complete

Securing Your Networks

5 hours to complete
11 videos (Total 70 min), 7 readings, 5 quizzes
11 videos
Network Hardware Hardening9m
Network Software Hardening5m
Joe Personal Obstacle44s
WEP Encryption and Why You Shouldn't Use It8m
Let's Get Rid of WEP! WPA/WPA214m
Wireless Hardening3m
Heather Social Engineering1m
Sniffing the Network5m
Wireshark and tcpdump6m
Intrusion Detection/Prevention Systems6m
7 readings
Supplemental Reading for Network Hardening Best Practices10m
Supplemental Reading on IEEE 802.1X10m
Supplementary reading on HAProxy, nginx and Apache HTTP server10m
Supplementary reading for WEP Encryption and Why You Shouldn't Use It10m
Supplementary reading on WiFi Protected Setup (WPS) PIN brute force vulnerability10m
Supplemental Reading for Promiscuous Mode10m
Supplemental reading for Intrusion Detection/Prevention System10m
4 practice exercises
Secure Network Architecture30m
Wireless Security30m
Network Monitoring30m
Week Four Practice Quiz30m

Reviews

TOP REVIEWS FROM IT SECURITY: DEFENSE AGAINST THE DIGITAL DARK ARTS

View all reviews

Frequently Asked Questions

  • Access to lectures and assignments depends on your type of enrollment. If you take a course in audit mode, you will be able to see most course materials for free. To access graded assignments and to earn a Certificate, you will need to purchase the Certificate experience, during or after your audit. If you don't see the audit option:

    • The course may not offer an audit option. You can try a Free Trial instead, or apply for Financial Aid.
    • The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
  • When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

  • If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.

  • This Course doesn't carry university credit, but some universities may choose to accept Course Certificates for credit. Check with your institution to learn more. Online Degrees and Mastertrack™ Certificates on Coursera provide the opportunity to earn university credit.

More questions? Visit the Learner Help Center.