IT Security: Defense against the digital dark arts

Start Date: 06/13/2021

Course Type: Common Course

Course Link:

About Course

This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. Finally, we’ll go through a case study, where we examine the security model of Chrome OS. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team. At the end of this course, you’ll understand: ● how various encryption algorithms and techniques work as well as their benefits and limitations. ● various authentication systems and types. ● the difference between authentication and authorization. ● how to evaluate potential risks and recommend ways to reduce risk. ● best practices for securing a network. ● how to help others to grasp security concepts and protect themselves.

Course Syllabus

Welcome to the IT Security course of the IT Support Professional Certificate! In the first week of this course, we will cover the basics of security in an IT environment. We will learn how to define and recognize security risks, vulnerabilities and threats. We'll identify the most common security attacks in an organization and understand how security revolves around the "CIA" principle. By the end of this module, you will know the types of malicious software, network attacks, client-side attacks, and the essential security terms you'll see in the workplace.

Coursera Plus banner featuring three learners and university partner logos

Course Introduction

IT Security: Defense against the digital dark arts The IT security industry is undergoing a digital transformation. This course focuses on the changes that come with the digitalization of the IT industry. IT security is the use of encryption and authentication methods to protect information in computer systems against unauthorized access. The focus of this course is the use of strong cryptography and authentication methods to protect IT assets. IT assets are defined as "business critical infrastructure" as part of the segment on cybersecurity. This includes data centers, network infrastructure, and business as a service businesses. The first part of this course focuses on industry standards and software engineering practices. IT assets are defined as "business as a service" businesses or organizations that have a core value of using and sharing information. It also includes business as a service requirements for IT departments, as well as information security management information systems. Finally, this course covers the use of strong cryptography and authentication methods to protect IT assets. IT security is a topic that is both timely and important. During the last ten years, the IT security market has grown by approximately 50 percent. The growth in the IT security market has resulted in several hundred billion dollars in assets under management. IT investments have also grown by approximately 50 percent since the early 2000s. Given the importance of IT in today's digital economy, the growth in the IT security market has resulted in several defense programs and organizations. This course will explore the types of IT security measures, and what they entail. The course will also focus on industry

Course Tag

Cybersecurity Wireless Security Cryptography Network Security

Related Wiki Topic

Article Example
Defense Security Cooperation Agency Founded in 1961, the Defense Security Assistance Agency was renamed the Defense Security Cooperation Agency effective October 1, 1998.
Center for Homeland Defense and Security The Center’s programs and resources have been developed to advance the study of homeland security research, scholarship, and professional discipline to enhance U.S. national security and safety. The Center offers a Master’s of Arts degree in Security Studies (Homeland Security and Defense), an Executive Leaders Program, Executive Education Seminars, the University and Agency Partnership Initiative, and self-study courses. Resources include the Homeland Security Digital Library and "Homeland Security Affairs," an on open-source academic journal.
Defense Security Service The Defense Security Service (DSS) is a federal security agency of the United States Department of Defense (DoD). Within areas of DoD responsibility, DSS is tasked with facilitating personnel security investigations, supervising industrial security, and performing security education and awareness training. DSS is an authorized Federal Security Agency. Industrial Security Representatives and Information System Security Professionals are credentialed government agents. Originally known as the Defense Investigative Service (DIS), DIS was established in 1972. DSS changed from DIS in 1999.
Boeing Defense, Space & Security Boeing Defense, Space & Security (BDS) is a division (business unit) of The Boeing Company. It is responsible for defense and aerospace products and services. It was formerly known as Boeing Integrated Defense Systems (IDS).
Computer security software The defense of computers against intrusion and unauthorized use of resources is called "computer security". Similarly, the defense of computer networks is called "network security".
Digital self-defense Digital self-defense is the use of self-defense strategies by Internet users to ensure digital security; that is to say, the protection of confidential personal electronic information. Internet security software provides initial protection by setting up a firewall, as well as scanning computers for malware, viruses, Trojan horses, worms and spyware. However information at most risk includes personal details such as birthdates, phone numbers, bank account and schooling details, sexuality, religious affiliations, email addresses and passwords. This information is often openly revealed in social networking sites leaving Internet users vulnerable to social engineering and possibly Internet crime. Mobile devices, especially those with Wi-Fi, allow this information to be shared inadvertently.
Defense Security Command "The Defense Security Command was formally activated in October 1977. This merger of the Army Security Command, the Navy Security Unit, and the Air Force Office of Special Investigations produced a single, integrated unit under the direct command and operational control of the minister of national defense." (Library of Congress Country Study via )
Defense Security Service The Defense Security Service is not to be confused with the U.S. Diplomatic Security Service (DSS) of the State Department. The special agents of the Diplomatic Security Service are sworn federal law enforcement agents.
Defense Security Service DSS Industrial Security Representatives and Information System Security Professionals are credentialed Special Agents. Stanley Sims, the Director of DSS, retired in 2016. He is now the Director of Security of the foreign owned (Canadian) defense contractor, CGI.
Against the Dark Against the Dark is a 2009 American action horror film starring Steven Seagal and directed by Richard Crudo.
Defense Security Cooperation Agency The Defense Security Cooperation Agency (DSCA), as part of the United States Department of Defense (DoD), provides financial and technical assistance, transfer of defense matériel, training and services to allies, and promotes military-to-military contacts.
Director of Security of the Defense Establishment Director of Security of the Defense Establishment or just Ministry of Defense Security Authority, Malmab (, "Ha-Memune al ha-bitahon be-Misrad Ha-Bitahon") is a department in the Israeli Defense Ministry that responsible for the security of the Defense Ministry, Israeli weapons industries and institutions in dealing with development and production of weapons of mass destruction and defensive centers such, the Negev Nuclear Research Center, Israel Institute for Biological Research and military units engaged in these areas.
Defense Security Command The Republic of Korea Armed Forces's Defense Security Command (DSC) was founded as the "Army Counterintelligence Corps" on October 21, 1950, and it functioned as the primary organization within the military charged with internal security, preservation of loyalty to the regime, and deterrence and investigation of subversion.
Digital security Other telecommunication developments involving digital security include mobile signatures, which use the embedded SIM card to generate a legally binding electronic signature.
Against a Dark Background "Against a Dark Background" was rewritten from an original work of 1975. Banks said that it was the last of his old material that he had to rewrite.
Gunderam Defense Although 2...Qe7 does answer the threat against Black's e-pawn, it interferes with the development of Black's dark-square bishop. One of the ideas behind this awkward queen move is to unbalance the game by castling queenside while White will presumably castle kingside. Not to be confused with Câmara Defense, which continues with the steps of the King's Indian Defense after 2...Qe7.
Digital dark age The digital dark age is the perception of a possible future situation where it will be difficult or impossible to read historical electronic documents and multimedia, because they have been recorded in an obsolete and obscure file format. The name derives from the term "Dark Ages" in the sense that there would be a relative lack of written record, as documents are transferred to digital formats and original copies lost.
Digital security The UCLA Internet Report: Surveying the Digital Future (2000) found that the privacy of personal data created barriers to online sales and that more than nine out of 10 internet users (were) somewhat or very concerned about credit card security.
Digital dark age The Internet Archive has stated that one of their goals is to prevent the digital dark age.
Center for Homeland Defense and Security The programs and resources of the CHDS improve domestic safety and defense by promoting the study of homeland security as a field of research, scholarship, and professional discipline. There are several types and levels of homeland security education programs offered by the Center, including a master's degree program, seminars, a digital library, self-study courses, an online journal, and podcasts.