课程信息
4.7
1,511 个评分
242 个审阅
专项课程
100% 在线

100% 在线

立即开始,按照自己的计划学习。
可灵活调整截止日期

可灵活调整截止日期

根据您的日程表重置截止日期。
初级

初级

完成时间(小时)

完成时间大约为18 小时

建议:8 hours/week...
可选语言

英语(English)

字幕:英语(English), 阿拉伯语(Arabic)

您将获得的技能

CybersecurityWireless SecurityCryptographyNetwork Security
专项课程
100% 在线

100% 在线

立即开始,按照自己的计划学习。
可灵活调整截止日期

可灵活调整截止日期

根据您的日程表重置截止日期。
初级

初级

完成时间(小时)

完成时间大约为18 小时

建议:8 hours/week...
可选语言

英语(English)

字幕:英语(English), 阿拉伯语(Arabic)

教学大纲 - 您将从这门课程中学到什么

1
完成时间(小时)
完成时间为 3 小时

Understanding Security Threats

Welcome to the IT Security course of the IT Support Professional Certificate! In the first week of this course, we will cover the basics of security in an IT environment. We will learn how to define and recognize security risks, vulnerabilities and threats. We'll identify the most common security attacks in an organization and understand how security revolves around the "CIA" principle. By the end of this module, you will know the types of malicious software, network attacks, client-side attacks, and the essential security terms you'll see in the workplace. ...
Reading
10 个视频 (总计 36 分钟), 7 个阅读材料, 4 个测验
Video10 个视频
The CIA Triad2分钟
Essential Security Terms4分钟
Malicious Software5分钟
Malware Continued2分钟
Network Attacks3分钟
Denial-of-Service3分钟
Client-Side Attacks2分钟
Password Attacks2分钟
Deceptive Attacks3分钟
Reading7 个阅读材料
Navigating Coursera10分钟
Program Surveys10分钟
How to Use Discussion Forums10分钟
Get to Know Your Classmates10分钟
Supplemental Reading for Malicious Software10分钟
Supplemental Reading for Network Attacks10分钟
Supplemental Reading for DDoS Attacks10分钟
Quiz4 个练习
Malicious Software14分钟
Network Attacks8分钟
Other Attacks6分钟
Understanding Security Threats26分钟
2
完成时间(小时)
完成时间为 6 小时

Pelcgbybtl (Cryptology)

In the second week of this course, we'll learn about cryptology. We'll explore different types of encryption practices and how they work. We'll show you the most common algorithms used in cryptography and how they've evolved over time. By the end of this module, you'll understand how symmetric encryption, asymmetric encryption, and hashing work; you'll also know how to choose the most appropriate cryptographic method for a scenario you may see in the workplace. ...
Reading
14 个视频 (总计 87 分钟), 9 个阅读材料, 7 个测验
Video14 个视频
Symmetric Cryptography5分钟
Symmetric Encryption Algorithms9分钟
Rob What a Security Engineer Does1分钟
Asymmetric Cryptography7分钟
Asymmetric Encryption Algorithms5分钟
Hashing3分钟
Hashing Algorithms5分钟
Hashing Algorithms (continued)5分钟
Public Key Infrastructure9分钟
Cryptography in Action8分钟
Securing Network Traffic6分钟
Cryptographic Hardware6分钟
Instructions for Accessing Linux Qwiklabs5分钟
Reading9 个阅读材料
Supplemental Reading for The Future of Cryptanalysis10分钟
Supplemental Reading for Symmetric Encryptions10分钟
Supplemental Reading for Asymmetric Encryption Attack10分钟
Supplemental Reading for SHA1 Attacks10分钟
Supplemental Reading for the X.509 Standard10分钟
Supplemental Reading for PGP10分钟
Supplemental Reading for Securing Network Traffic10分钟
Supplemental Reading for TPM Attacks10分钟
Instructions for Accessing Qwiklabs10分钟
Quiz5 个练习
Symmetric Encryption10分钟
Public Key or Asymmetric Encryption6分钟
Hashing8分钟
Cryptography Applications6分钟
Week Two Practice Quiz28分钟
3
完成时间(小时)
完成时间为 2 小时

AAA Security (Not Roadside Assistance)

In the third week of this course, we'll learn about the "three A's" in cybersecurity. No matter what type of tech role you're in, it's important to understand how authentication, authorization, and accounting work within an organization. By the end of this module, you'll be able to choose the most appropriate method of authentication, authorization, and level of access granted for users in an organization....
Reading
14 个视频 (总计 55 分钟), 2 个阅读材料, 3 个测验
Video14 个视频
Multifactor Authentication12分钟
Certificates3分钟
LDAP3分钟
RADIUS1分钟
Kerberos7分钟
TACACS+1分钟
Single Sign-On3分钟
Rob Path to IT1分钟
Authorization and Access Control Methods1分钟
Access Control5分钟
Access Control List1分钟
Tracking Usage and Access3分钟
Rob Important Skills in Security1分钟
Reading2 个阅读材料
Supplemental Reading for Authentication10分钟
Supplemental Reading for Authorization10分钟
Quiz3 个练习
Authentication26分钟
Authorization and Accounting6分钟
AAA Security (Not Roadside Assistance)22分钟
4
完成时间(小时)
完成时间为 4 小时

Securing Your Networks

In the fourth week of this course, we'll learn about secure network architecture. It's important to know how to implement security measures on a network environment, so we'll show you some of the best practices to protect an organization's network. We'll learn about some of the risks of wireless networks and how to mitigate them. We'll also cover ways to monitor network traffic and read packet captures. By the end of this module, you'll understand how VPNs, proxies and reverse proxies work; why 802.1X is a super important for network protection; understand why WPA/WPA2 is better than WEP; and know how to use tcpdump to capture and analyze packets on a network. That's a lot of information, but well worth it for an IT Support Specialist to understand! ...
Reading
11 个视频 (总计 70 分钟), 5 个阅读材料, 5 个测验
Video11 个视频
Network Hardware Hardening9分钟
Network Software Hardening5分钟
Joe Personal Obstacle44s
WEP Encryption and Why You Shouldn't Use It8分钟
Let's Get Rid of WEP! WPA/WPA214分钟
Wireless Hardening3分钟
Heather Social Engineering1分钟
Sniffing the Network5分钟
Wireshark and tcpdump6分钟
Intrusion Detection/Prevention Systems6分钟
Reading5 个阅读材料
Supplemental Reading for Network Hardening Best Practices10分钟
Supplemental Reading on IEEE 802.1X10分钟
Supplementary reading on HAProxy, nginx and Apache HTTP server10分钟
Supplementary reading on WiFi Protected Setup (WPS) PIN brute force vulnerability10分钟
Supplemental Reading for Promiscuous Mode10分钟
Quiz4 个练习
Secure Network Architecture14分钟
Wireless Security8分钟
Network Monitoring10分钟
Week Four Practice Quiz34分钟
4.7
242 个审阅Chevron Right
职业方向

50%

完成这些课程后已开始新的职业生涯
工作福利

50%

通过此课程获得实实在在的工作福利

热门审阅

创建者 DSApr 26th 2018

Great course that is full of useful information and presented in an easy to understand way. It's an awesome beginner course that will add to your knowledge and further your knowledge of IT security.

创建者 DSAug 17th 2018

This course was insane, all the possibilities, the potential for growth, and the different ways to help protect against cyber attacks. It was truly an eye-opening lesson in security. Thank you.

讲师

关于 Google

The IT Support Professional Certificate program is part of Grow with Google, an initiative that draws on Google's 20-year history of building products, platforms, and services that help people and businesses grow. Through programs like these, we aim to help everyone– those who make up the workforce of today and the students who will drive the workforce of tomorrow – access the best of Google’s training and tools to grow their skills, careers, and businesses....

关于 Google IT Support Professional Certificate 专项课程

This five-course certificate, developed by Google, includes innovative curriculum designed to prepare you for an entry-level role in IT support. A job in IT can mean in-person or remote help desk work in a small business or at a global company like Google. If you’ve been tinkering with IT or are new to the field, you’re at the right place. The program is part of Grow with Google, a Google initiative to help create economic opportunities for all Americans. Check out this video to learn more. Upon completion of the certificate, you can share your information with top employers like Cognizant, GE Digital, H&R Block, Hulu, J.M. Smucker, Infosys, Intel, KForce, MCPc, PNC Bank, RICOH USA, Sprint, TEKSystems, UPMC, Veterans United Home Loans, Walmart and their subsidiaries, and of course, Google. Through a mix of video lectures, quizzes, and hand-on labs and widgets, the program will introduce you to troubleshooting and customer service, networking, operating systems, system administration and security. Along the way, you’ll hear from Googlers with unique backgrounds whose own foundation in IT support served as a jumping off point for their careers. By dedicating 8-10 hours a week, you can complete the certificate in about eight months. You can skip through content that you might already know and speed ahead to the graded assessments. Except as otherwise noted, the contents on this site are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License....
Google IT Support Professional Certificate

常见问题

  • 注册以便获得证书后,您将有权访问所有视频、测验和编程作业(如果适用)。只有在您的班次开课之后,才可以提交和审阅同学互评作业。如果您选择在不购买的情况下浏览课程,可能无法访问某些作业。

  • 您注册课程后,将有权访问证书中的所有课程,并且会在完成作业后获得证书。您的电子证书将添加到您的成就页中,您可以通过该页打印证书或将其添加到您的领英档案中。如果您只想阅读和查看课程内容,可以免费旁听课程。

还有其他问题吗?请访问 学生帮助中心