This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. Finally, we’ll go through a case study, where we examine the security model of Chrome OS. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.
- 5 stars
- 4 stars
- 3 stars
- 2 stars
- 1 star
来自 IT SECURITY: DEFENSE AGAINST THE DIGITAL DARK ARTS 的热门评论
Great course that is full of useful information and presented in an easy to understand way. It's an awesome beginner course that will add to your knowledge and further your knowledge of IT security.
This course was insane, all the possibilities, the potential for growth, and the different ways to help protect against cyber attacks. It was truly an eye-opening lesson in security. Thank you.
Thank you to all the instructors. I learned concrete and useful IT skills from the courses and especially from the projects. After completing this course, I feel I want to learn more and more.
It's very nice even the teacher is very pleasant the way of representing things is just mind-blowing i am too happy to learn with it. I feel I am too lucky to have such a teacher!! Hats off!!
I feel like this went way more in depth than I think most people just getting into it can handle. I think either this needs to be dumbed down or drawn out a bit more, but a lot of great info.
Course 1 and 5 are probably my favorite of the courses because i feel i learned a lot in these two the most, all are great i just really wanted to learn more about security which was course 5
A more in-depth concept can be included in the course and provide a reference to open source tools/technologies so young and aspiring security professionals can gain more out of this course.
Make you relies that we may lock are car and house but we really don'y think how an intrude can take control of our lives but gaining access through poor security at our home and work spaces