Introduction to IT Security

Akamai Technologies, Inc. via Coursera

Go to Course: https://www.coursera.org/learn/akamai-security

Introduction

Students will learn about security and risk management, IAM, cryptography, vulnerability management, and incident response.

Syllabus

Security Fundamentals

In this module, you will explore the information security cycle including the concepts of security, risk and the security management process. Then you will leqarn about physical security including the different control types and physical security controls from each type, and addressing environmental exposures.

Authentication and Account Management

In this module, you will explore authentication in depth including learning about authentication factors, multi-factor and single-factor authentication, and strong passwords. You will learn about account management including multiple and shared accounts, single sign-on and access control.

Device Security

In this module, you will learn about securing endpoints including patch management and application control. You will explore integrating mobile and IoT devices, and the effects of location services.

Encryption

In this module, you will learn the basics of cryptography including the difference between symmetric and asymmetric encryption, and some of the algorithms. You will learn about hashes and digital certificates and understand the fundamentals of a Public Key Infrastructure.

Network Security

In this module, you will review network components and learn about defense in depth including firewalls and intrusion detection/prevention systems. You will learn about extending the network perimeter including wireless networks, cloud services and remote access.

Security Management

In this module, you will learn about vulnerability scanning and ethical hacking. You will explore data security, security policies, and gain a deeper understanding of risk. You will also learn about compliance.

Security Threats

In this module, you will learn about attackers and attacks. You will learn about the concepts behind social engineering and some of the more common social engineering attacks. You will learn about web attacks, malware, software attacks, wireless attacks and password attacks.

Managing Security Incidents

In this module, you will learn about how to manage security incidents including prevention techniques. You will gain an understanding of incident response, forensics, business continuity, redundancy, the disaster recovery process, RAID and backups.

Capstone

Students will demonstrate mastery of the material by creating and uploading a capstone project.

Overview

In Introduction to IT Security, you’ll develop a comprehensive understanding of security management. You’ll learn about risk assessment and management concepts, analyze quantitative and qualitative risk, and familiarize yourself with various types of security controls. Upon completing this course, you’ll be able to: ● Understand the security management process ● Harden endpoint devices including mobile and IoT devices ● Manage incident responses effectively and plan for business continuity ● Im

Skills

Reviews