Acerca de este Curso

1,389,470 vistas recientes
Certificado para compartir
Obtén un certificado al finalizar
100 % en línea
Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles
Restablece las fechas límite en función de tus horarios.
Nivel principiante
Aprox. 29 horas para completar
Inglés (English)

Habilidades que obtendrás

CybersecurityWireless SecurityCryptographyNetwork Security
Certificado para compartir
Obtén un certificado al finalizar
100 % en línea
Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles
Restablece las fechas límite en función de tus horarios.
Nivel principiante
Aprox. 29 horas para completar
Inglés (English)

Instructor

ofrecido por

Placeholder

Google

Programa - Qué aprenderás en este curso

Calificación del contenidoThumbs Up97%(65,041 calificaciones)Info
Semana
1

Semana 1

5 horas para completar

Understanding Security Threats

5 horas para completar
10 videos (Total 36 minutos), 7 lecturas, 4 cuestionarios
10 videos
The CIA Triad2m
Essential Security Terms4m
Malicious Software5m
Malware Continued2m
Network Attacks3m
Denial-of-Service3m
Client-Side Attacks2m
Password Attacks2m
Deceptive Attacks3m
7 lecturas
Navigating Coursera10m
Program Surveys10m
How to Use Discussion Forums10m
Get to Know Your Classmates10m
Supplemental Reading for Malicious Software10m
Supplemental Reading for Network Attacks10m
Supplemental Reading for DDoS Attacks10m
4 ejercicios de práctica
Malicious Software30m
Network Attacks30m
Other Attacks30m
Understanding Security Threats1h 5m
Semana
2

Semana 2

7 horas para completar

Pelcgbybtl (Cryptology)

7 horas para completar
14 videos (Total 83 minutos), 9 lecturas, 7 cuestionarios
14 videos
Symmetric Cryptography5m
Symmetric Encryption Algorithms9m
Rob What a Security Engineer Does1m
Asymmetric Cryptography7m
Asymmetric Encryption Algorithms5m
Hashing3m
Hashing Algorithms5m
Hashing Algorithms (continued)5m
Public Key Infrastructure9m
Cryptography in Action8m
Securing Network Traffic6m
Cryptographic Hardware6m
Rejection36s
9 lecturas
Supplemental Reading for The Future of Cryptanalysis10m
Supplemental Reading for Symmetric Encryptions10m
Supplemental Reading for Asymmetric Encryption Attack10m
Supplemental Reading for SHA1 Attacks10m
Supplemental Reading for the X.509 Standard10m
Supplemental Reading for PGP10m
Supplemental Reading for Securing Network Traffic10m
Supplemental Reading for TPM Attacks10m
Instructions for Accessing Linux and Windows Qwiklabs10m
5 ejercicios de práctica
Symmetric Encryption30m
Public Key or Asymmetric Encryption30m
Hashing30m
Cryptography Applications30m
Week Two Practice Quiz30m
Semana
3

Semana 3

3 horas para completar

AAA Security (Not Roadside Assistance)

3 horas para completar
14 videos (Total 55 minutos), 2 lecturas, 3 cuestionarios
14 videos
Multifactor Authentication12m
Certificates3m
LDAP3m
RADIUS1m
Kerberos7m
TACACS+1m
Single Sign-On3m
Rob Path to IT1m
Authorization and Access Control Methods1m
Access Control5m
Access Control List1m
Tracking Usage and Access3m
Rob Important Skills in Security1m
2 lecturas
Supplemental Reading for Authentication10m
Supplemental Reading for Authorization10m
3 ejercicios de práctica
Authentication30m
Authorization and Accounting30m
AAA Security (Not Roadside Assistance)55m
Semana
4

Semana 4

5 horas para completar

Securing Your Networks

5 horas para completar
11 videos (Total 70 minutos), 7 lecturas, 5 cuestionarios
11 videos
Network Hardware Hardening9m
Network Software Hardening5m
Joe Personal Obstacle44s
WEP Encryption and Why You Shouldn't Use It8m
Let's Get Rid of WEP! WPA/WPA214m
Wireless Hardening3m
Heather Social Engineering1m
Sniffing the Network5m
Wireshark and tcpdump6m
Intrusion Detection/Prevention Systems6m
7 lecturas
Supplemental Reading for Network Hardening Best Practices10m
Supplemental Reading on IEEE 802.1X10m
Supplementary reading on HAProxy, nginx and Apache HTTP server10m
Supplementary reading for WEP Encryption and Why You Shouldn't Use It10m
Supplementary reading on WiFi Protected Setup (WPS) PIN brute force vulnerability10m
Supplemental Reading for Promiscuous Mode10m
Supplemental reading for Intrusion Detection/Prevention System10m
4 ejercicios de práctica
Secure Network Architecture30m
Wireless Security30m
Network Monitoring30m
Week Four Practice Quiz30m

Reseñas

Principales reseñas sobre IT SECURITY: DEFENSE AGAINST THE DIGITAL DARK ARTS

Ver todas las reseñas

Preguntas Frecuentes

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.