Acerca de este Curso
4.7
1,487 calificaciones
237 revisiones
100 % en línea

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.
Nivel principiante

Nivel principiante

Horas para completar

Aprox. 18 horas para completar

Sugerido: 8 hours/week...
Idiomas disponibles

Inglés (English)

Subtítulos: Inglés (English), Árabe (Arabic)

Habilidades que obtendrás

CybersecurityWireless SecurityCryptographyNetwork Security
100 % en línea

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.
Nivel principiante

Nivel principiante

Horas para completar

Aprox. 18 horas para completar

Sugerido: 8 hours/week...
Idiomas disponibles

Inglés (English)

Subtítulos: Inglés (English), Árabe (Arabic)

Programa - Qué aprenderás en este curso

Semana
1
Horas para completar
3 horas para completar

Understanding Security Threats

Welcome to the IT Security course of the IT Support Professional Certificate! In the first week of this course, we will cover the basics of security in an IT environment. We will learn how to define and recognize security risks, vulnerabilities and threats. We'll identify the most common security attacks in an organization and understand how security revolves around the "CIA" principle. By the end of this module, you will know the types of malicious software, network attacks, client-side attacks, and the essential security terms you'll see in the workplace. ...
Reading
10 videos (Total 36 min), 7 readings, 4 quizzes
Video10 videos
The CIA Triad2m
Essential Security Terms4m
Malicious Software5m
Malware Continued2m
Network Attacks3m
Denial-of-Service3m
Client-Side Attacks2m
Password Attacks2m
Deceptive Attacks3m
Reading7 lecturas
Navigating Coursera10m
Program Surveys10m
How to Use Discussion Forums10m
Get to Know Your Classmates10m
Supplemental Reading for Malicious Software10m
Supplemental Reading for Network Attacks10m
Supplemental Reading for DDoS Attacks10m
Quiz4 ejercicios de práctica
Malicious Software14m
Network Attacks8m
Other Attacks6m
Understanding Security Threats26m
Semana
2
Horas para completar
6 horas para completar

Pelcgbybtl (Cryptology)

In the second week of this course, we'll learn about cryptology. We'll explore different types of encryption practices and how they work. We'll show you the most common algorithms used in cryptography and how they've evolved over time. By the end of this module, you'll understand how symmetric encryption, asymmetric encryption, and hashing work; you'll also know how to choose the most appropriate cryptographic method for a scenario you may see in the workplace. ...
Reading
14 videos (Total 87 min), 9 readings, 7 quizzes
Video14 videos
Symmetric Cryptography5m
Symmetric Encryption Algorithms9m
Rob What a Security Engineer Does1m
Asymmetric Cryptography7m
Asymmetric Encryption Algorithms5m
Hashing3m
Hashing Algorithms5m
Hashing Algorithms (continued)5m
Public Key Infrastructure9m
Cryptography in Action8m
Securing Network Traffic6m
Cryptographic Hardware6m
Instructions for Accessing Linux Qwiklabs5m
Reading9 lecturas
Supplemental Reading for The Future of Cryptanalysis10m
Supplemental Reading for Symmetric Encryptions10m
Supplemental Reading for Asymmetric Encryption Attack10m
Supplemental Reading for SHA1 Attacks10m
Supplemental Reading for the X.509 Standard10m
Supplemental Reading for PGP10m
Supplemental Reading for Securing Network Traffic10m
Supplemental Reading for TPM Attacks10m
Instructions for Accessing Qwiklabs10m
Quiz5 ejercicios de práctica
Symmetric Encryption10m
Public Key or Asymmetric Encryption6m
Hashing8m
Cryptography Applications6m
Week Two Practice Quiz28m
Semana
3
Horas para completar
2 horas para completar

AAA Security (Not Roadside Assistance)

In the third week of this course, we'll learn about the "three A's" in cybersecurity. No matter what type of tech role you're in, it's important to understand how authentication, authorization, and accounting work within an organization. By the end of this module, you'll be able to choose the most appropriate method of authentication, authorization, and level of access granted for users in an organization....
Reading
14 videos (Total 55 min), 2 readings, 3 quizzes
Video14 videos
Multifactor Authentication12m
Certificates3m
LDAP3m
RADIUS1m
Kerberos7m
TACACS+1m
Single Sign-On3m
Rob Path to IT1m
Authorization and Access Control Methods1m
Access Control5m
Access Control List1m
Tracking Usage and Access3m
Rob Important Skills in Security1m
Reading2 lecturas
Supplemental Reading for Authentication10m
Supplemental Reading for Authorization10m
Quiz3 ejercicios de práctica
Authentication26m
Authorization and Accounting6m
AAA Security (Not Roadside Assistance)22m
Semana
4
Horas para completar
4 horas para completar

Securing Your Networks

In the fourth week of this course, we'll learn about secure network architecture. It's important to know how to implement security measures on a network environment, so we'll show you some of the best practices to protect an organization's network. We'll learn about some of the risks of wireless networks and how to mitigate them. We'll also cover ways to monitor network traffic and read packet captures. By the end of this module, you'll understand how VPNs, proxies and reverse proxies work; why 802.1X is a super important for network protection; understand why WPA/WPA2 is better than WEP; and know how to use tcpdump to capture and analyze packets on a network. That's a lot of information, but well worth it for an IT Support Specialist to understand! ...
Reading
11 videos (Total 70 min), 5 readings, 5 quizzes
Video11 videos
Network Hardware Hardening9m
Network Software Hardening5m
Joe Personal Obstaclem
WEP Encryption and Why You Shouldn't Use It8m
Let's Get Rid of WEP! WPA/WPA214m
Wireless Hardening3m
Heather Social Engineering1m
Sniffing the Network5m
Wireshark and tcpdump6m
Intrusion Detection/Prevention Systems6m
Reading5 lecturas
Supplemental Reading for Network Hardening Best Practices10m
Supplemental Reading on IEEE 802.1X10m
Supplementary reading on HAProxy, nginx and Apache HTTP server10m
Supplementary reading on WiFi Protected Setup (WPS) PIN brute force vulnerability10m
Supplemental Reading for Promiscuous Mode10m
Quiz4 ejercicios de práctica
Secure Network Architecture14m
Wireless Security8m
Network Monitoring10m
Week Four Practice Quiz34m
4.7
237 revisionesChevron Right
Dirección de la carrera

50%

comenzó una nueva carrera después de completar estos cursos
Beneficio de la carrera

83%

consiguió un beneficio tangible en su carrera profesional gracias a este curso

Principales revisiones

por DSApr 26th 2018

Great course that is full of useful information and presented in an easy to understand way. It's an awesome beginner course that will add to your knowledge and further your knowledge of IT security.

por DSAug 17th 2018

This course was insane, all the possibilities, the potential for growth, and the different ways to help protect against cyber attacks. It was truly an eye-opening lesson in security. Thank you.

Instructor

Acerca de Google

The IT Support Professional Certificate program is part of Grow with Google, an initiative that draws on Google's 20-year history of building products, platforms, and services that help people and businesses grow. Through programs like these, we aim to help everyone– those who make up the workforce of today and the students who will drive the workforce of tomorrow – access the best of Google’s training and tools to grow their skills, careers, and businesses....

Acerca del programa especializado Google IT Support Professional Certificate

This five-course certificate, developed by Google, includes innovative curriculum designed to prepare you for an entry-level role in IT support. A job in IT can mean in-person or remote help desk work in a small business or at a global company like Google. If you’ve been tinkering with IT or are new to the field, you’re at the right place. The program is part of Grow with Google, a Google initiative to help create economic opportunities for all Americans. Check out this video to learn more. Upon completion of the certificate, you can share your information with top employers like Cognizant, GE Digital, H&R Block, Hulu, J.M. Smucker, Infosys, Intel, KForce, MCPc, PNC Bank, RICOH USA, Sprint, TEKSystems, UPMC, Veterans United Home Loans, Walmart and their subsidiaries, and of course, Google. Through a mix of video lectures, quizzes, and hand-on labs and widgets, the program will introduce you to troubleshooting and customer service, networking, operating systems, system administration and security. Along the way, you’ll hear from Googlers with unique backgrounds whose own foundation in IT support served as a jumping off point for their careers. By dedicating 8-10 hours a week, you can complete the certificate in about eight months. You can skip through content that you might already know and speed ahead to the graded assessments. Except as otherwise noted, the contents on this site are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License....
Google IT Support Professional Certificate

Preguntas Frecuentes

  • Una vez que te inscribes para obtener un Certificado, tendrás acceso a todos los videos, cuestionarios y tareas de programación (si corresponde). Las tareas calificadas por compañeros solo pueden enviarse y revisarse una vez que haya comenzado tu sesión. Si eliges explorar el curso sin comprarlo, es posible que no puedas acceder a determinadas tareas.

  • Cuando te inscribes en un curso, obtienes acceso a todos los cursos del Certificado y te darán un certificado cuando completes el trabajo. Se añadirá tu Certificado electrónico a la página Logros. Desde allí, puedes imprimir tu Certificado o añadirlo a tu perfil de LinkedIn. Si solo quieres leer y visualizar el contenido del curso, puedes auditar el curso sin costo.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.