Google offers a comprehensive IT Security Tutorial for Beginners that covers the protection of computer systems from theft, damage, and disruption to hardware, software, and electronic data. Cybersecurity also involves physical access control to system hardware and safeguards against harm caused by network access, malicious data, and code injection. IT security personnel can be vulnerable to social engineering tactics that could lead them to deviate from secure procedures, whether intentionally or accidentally. As computer systems, the Internet, and wireless networks like Bluetooth and Wi-Fi become increasingly relied upon, and with the proliferation of “smart” devices such as smartphones, televisions, and the Internet of Things, the field of IT security is of growing importance Some of the Videos are shown twice and the order is very wrong a few times. I marked the ones that appear twice with a “skip”. Understanding Security Threats -Introduction (0:00) –Malicious Software (5:50) -The CIA triad -Essential Security Terms (8:24) -Malicious Software (12:34) -Malware Continued (17:40) –Attacks (20:31) -Network Attacks -Denial-of-Service (24:13) –Other Attacks (27:34) -Client-Side Attacks -Password Attacks (30:00) -Deceptive Attacks (32:12) Pelcgbybtl (Cryptology) –Symmetric Encryption (35:56) -Cryptography -Symmetric Cryptography (43:27) -Symmetric Encryption Algorithms (48:54) -Asymmetric Cryptography (58:07) –Hashing (1:11:47) -Hashing -Hashing Algorithms (1:15:35) -Hashing Algorithms (continued) (1:20:59) –Crypthography Applications (1:26:36) -Public Key Infrastructure -Cryptography in Action (1:35:41) -Secure Network Traffic (1:44:12) -Cryptographic Hardware (1:56:35) AAA Security (Not Roadside Assistance) –Authentication (1:50:17) -Authentication Best Practices -Multifactor Authentication (2:03:17) -LDAP (2:19:18) -RADIUS (2:22:55) -Single Sign-On (2:33:45) –Authorization (2:37:23) -Authorization and Access Control Methods -Access Control (2:39:00) –Accounting (5:20:50) -Tracking Usage and Access Securing Your Networks –Secure Network Architecture (5:11:59) skip -Network Hardening Best Practices -Network Hardening Best Practices (5:23:51) -Network Hardware Hardening (5:32:41) -Network Software Hardening (5:41:44) –Wireless Security (3:03:22) -WEP Encryption and Why You Shouldn’t Use It -Let’s Get Rid of WEP! WPA/WPA2 (3:11:58) -Wireless Hardening (3:26:17) -WEP Encryption and Why You Shouldn’t Use It (5:46:43) skip –Network Monitoring (3:29:24) -Sniffing the Network -Wireshark and tcpdump (3:34:40) Defense in Depth –System Hardening (2:44:08) skip -Host-Based Firewall -Logging and Auditing (2:48:31) skip -Antimalware Protection (2:55:35) skip -Intro to Defense in Depth (3:41:25) -Host-Based Firewall (3:49:30) -Logging and Auditing (3:53:51) -Antimalware Protection (4:00:57) -Disk Encryption (4:08:44) -Disabling Unnecessary Compontents (5:07:13) -Host-Based Firewall (5:55:19) skip -Logging and Auditing (5:59:40) skip -Antimalware Protection (6:06:45) skip -Disk Encryption (6:14:33) skip –Application Hardening (4:15:29) -Software Patch Management -Application Policies (4:22:02) -Software Patch Management (6:21:17) skip -Application Policies (6:27:51) skip Creating a Company Culture for Security –Risk in the Workplace (4:26:26) skip -Security Goals -Measuring and Assessing Risk (4:34:01) skip -Privacy Policy (4:39:23) skip -Security Goals (6:32:16) -Measuring and Assessing Risk (6:39:49) -Privacy Policy (6:45:12) –Users (4:43:15) skip -User Habits -Third-Party Security (4:49:16) skip –Incident Handling (4:53:26) skip -Incident Reporting and Analysis -Incident Response and Recovery (5:00:14) skip -User Habits (6:49:04) -Third-Party Security (6:55:05) -Security Training (6:59:15) –Incident Handling (7:02:48) -Incident Reporting and Analysis -Incident Response and Recovery (7:09:36) ⭐ Important Links and Notes ⭐ ⌨️ The creator of this course is Google ( Team: Grow with Google ) ⌨️ As per the Coursera FAQ section of Google IT Support Professional Certificate: Yes, the content in the Google IT Support Professional Certificate is licensed under a Creative Commons Attribution 4.0 International License. #itsecurity #cybersecurity #dataprotection #networksecurity #informationsecurity
Leave a comment