Informações sobre o curso
4.7
1,511 classificações
242 avaliações
100% online

100% online

Comece imediatamente e aprenda em seu próprio cronograma.
Prazos flexíveis

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.
Nível iniciante

Nível iniciante

Horas para completar

Aprox. 18 horas para completar

Sugerido: 8 hours/week...
Idiomas disponíveis

Inglês

Legendas: Inglês, Árabe

Habilidades que você terá

CybersecurityWireless SecurityCryptographyNetwork Security
100% online

100% online

Comece imediatamente e aprenda em seu próprio cronograma.
Prazos flexíveis

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.
Nível iniciante

Nível iniciante

Horas para completar

Aprox. 18 horas para completar

Sugerido: 8 hours/week...
Idiomas disponíveis

Inglês

Legendas: Inglês, Árabe

Programa - O que você aprenderá com este curso

Semana
1
Horas para completar
3 horas para concluir

Understanding Security Threats

Welcome to the IT Security course of the IT Support Professional Certificate! In the first week of this course, we will cover the basics of security in an IT environment. We will learn how to define and recognize security risks, vulnerabilities and threats. We'll identify the most common security attacks in an organization and understand how security revolves around the "CIA" principle. By the end of this module, you will know the types of malicious software, network attacks, client-side attacks, and the essential security terms you'll see in the workplace. ...
Reading
10 vídeos (total de (Total 36 mín.) min), 7 leituras, 4 testes
Video10 videos
The CIA Triad2min
Essential Security Terms4min
Malicious Software5min
Malware Continued2min
Network Attacks3min
Denial-of-Service3min
Client-Side Attacks2min
Password Attacks2min
Deceptive Attacks3min
Reading7 leituras
Navigating Coursera10min
Program Surveys10min
How to Use Discussion Forums10min
Get to Know Your Classmates10min
Supplemental Reading for Malicious Software10min
Supplemental Reading for Network Attacks10min
Supplemental Reading for DDoS Attacks10min
Quiz4 exercícios práticos
Malicious Software14min
Network Attacks8min
Other Attacks6min
Understanding Security Threats26min
Semana
2
Horas para completar
6 horas para concluir

Pelcgbybtl (Cryptology)

In the second week of this course, we'll learn about cryptology. We'll explore different types of encryption practices and how they work. We'll show you the most common algorithms used in cryptography and how they've evolved over time. By the end of this module, you'll understand how symmetric encryption, asymmetric encryption, and hashing work; you'll also know how to choose the most appropriate cryptographic method for a scenario you may see in the workplace. ...
Reading
14 vídeos (total de (Total 87 mín.) min), 9 leituras, 7 testes
Video14 videos
Symmetric Cryptography5min
Symmetric Encryption Algorithms9min
Rob What a Security Engineer Does1min
Asymmetric Cryptography7min
Asymmetric Encryption Algorithms5min
Hashing3min
Hashing Algorithms5min
Hashing Algorithms (continued)5min
Public Key Infrastructure9min
Cryptography in Action8min
Securing Network Traffic6min
Cryptographic Hardware6min
Instructions for Accessing Linux Qwiklabs5min
Reading9 leituras
Supplemental Reading for The Future of Cryptanalysis10min
Supplemental Reading for Symmetric Encryptions10min
Supplemental Reading for Asymmetric Encryption Attack10min
Supplemental Reading for SHA1 Attacks10min
Supplemental Reading for the X.509 Standard10min
Supplemental Reading for PGP10min
Supplemental Reading for Securing Network Traffic10min
Supplemental Reading for TPM Attacks10min
Instructions for Accessing Qwiklabs10min
Quiz5 exercícios práticos
Symmetric Encryption10min
Public Key or Asymmetric Encryption6min
Hashing8min
Cryptography Applications6min
Week Two Practice Quiz28min
Semana
3
Horas para completar
2 horas para concluir

AAA Security (Not Roadside Assistance)

In the third week of this course, we'll learn about the "three A's" in cybersecurity. No matter what type of tech role you're in, it's important to understand how authentication, authorization, and accounting work within an organization. By the end of this module, you'll be able to choose the most appropriate method of authentication, authorization, and level of access granted for users in an organization....
Reading
14 vídeos (total de (Total 55 mín.) min), 2 leituras, 3 testes
Video14 videos
Multifactor Authentication12min
Certificates3min
LDAP3min
RADIUS1min
Kerberos7min
TACACS+1min
Single Sign-On3min
Rob Path to IT1min
Authorization and Access Control Methods1min
Access Control5min
Access Control List1min
Tracking Usage and Access3min
Rob Important Skills in Security1min
Reading2 leituras
Supplemental Reading for Authentication10min
Supplemental Reading for Authorization10min
Quiz3 exercícios práticos
Authentication26min
Authorization and Accounting6min
AAA Security (Not Roadside Assistance)22min
Semana
4
Horas para completar
4 horas para concluir

Securing Your Networks

In the fourth week of this course, we'll learn about secure network architecture. It's important to know how to implement security measures on a network environment, so we'll show you some of the best practices to protect an organization's network. We'll learn about some of the risks of wireless networks and how to mitigate them. We'll also cover ways to monitor network traffic and read packet captures. By the end of this module, you'll understand how VPNs, proxies and reverse proxies work; why 802.1X is a super important for network protection; understand why WPA/WPA2 is better than WEP; and know how to use tcpdump to capture and analyze packets on a network. That's a lot of information, but well worth it for an IT Support Specialist to understand! ...
Reading
11 vídeos (total de (Total 70 mín.) min), 5 leituras, 5 testes
Video11 videos
Network Hardware Hardening9min
Network Software Hardening5min
Joe Personal Obstacle44s
WEP Encryption and Why You Shouldn't Use It8min
Let's Get Rid of WEP! WPA/WPA214min
Wireless Hardening3min
Heather Social Engineering1min
Sniffing the Network5min
Wireshark and tcpdump6min
Intrusion Detection/Prevention Systems6min
Reading5 leituras
Supplemental Reading for Network Hardening Best Practices10min
Supplemental Reading on IEEE 802.1X10min
Supplementary reading on HAProxy, nginx and Apache HTTP server10min
Supplementary reading on WiFi Protected Setup (WPS) PIN brute force vulnerability10min
Supplemental Reading for Promiscuous Mode10min
Quiz4 exercícios práticos
Secure Network Architecture14min
Wireless Security8min
Network Monitoring10min
Week Four Practice Quiz34min
4.7
242 avaliaçõesChevron Right
Direcionamento de carreira

50%

comecei uma nova carreira após concluir estes cursos
Benefício de carreira

50%

consegui um benefício significativo de carreira com este curso

Melhores avaliações

por DSApr 26th 2018

Great course that is full of useful information and presented in an easy to understand way. It's an awesome beginner course that will add to your knowledge and further your knowledge of IT security.

por DSAug 17th 2018

This course was insane, all the possibilities, the potential for growth, and the different ways to help protect against cyber attacks. It was truly an eye-opening lesson in security. Thank you.

Instrutores

Sobre Google

The IT Support Professional Certificate program is part of Grow with Google, an initiative that draws on Google's 20-year history of building products, platforms, and services that help people and businesses grow. Through programs like these, we aim to help everyone– those who make up the workforce of today and the students who will drive the workforce of tomorrow – access the best of Google’s training and tools to grow their skills, careers, and businesses....

Sobre o Programa de cursos integrados Google IT Support Professional Certificate

This five-course certificate, developed by Google, includes innovative curriculum designed to prepare you for an entry-level role in IT support. A job in IT can mean in-person or remote help desk work in a small business or at a global company like Google. If you’ve been tinkering with IT or are new to the field, you’re at the right place. The program is part of Grow with Google, a Google initiative to help create economic opportunities for all Americans. Check out this video to learn more. Upon completion of the certificate, you can share your information with top employers like Cognizant, GE Digital, H&R Block, Hulu, J.M. Smucker, Infosys, Intel, KForce, MCPc, PNC Bank, RICOH USA, Sprint, TEKSystems, UPMC, Veterans United Home Loans, Walmart and their subsidiaries, and of course, Google. Through a mix of video lectures, quizzes, and hand-on labs and widgets, the program will introduce you to troubleshooting and customer service, networking, operating systems, system administration and security. Along the way, you’ll hear from Googlers with unique backgrounds whose own foundation in IT support served as a jumping off point for their careers. By dedicating 8-10 hours a week, you can complete the certificate in about eight months. You can skip through content that you might already know and speed ahead to the graded assessments. Except as otherwise noted, the contents on this site are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License....
Google IT Support Professional Certificate

Perguntas Frequentes – FAQ

  • Ao se inscrever para um Certificado, você terá acesso a todos os vídeos, testes e tarefas de programação (se aplicável). Tarefas avaliadas pelos colegas apenas podem ser enviadas e avaliadas após o início da sessão. Caso escolha explorar o curso sem adquiri-lo, talvez você não consiga acessar certas tarefas.

  • Quando você se inscreve em um curso, ganha acesso a todos os cursos no certificado e obtém um certificado quando completar o trabalho. Seu certificado eletrônico pode ser adicionado à sua página de Participações, de onde você pode imprimi-lo ou adicioná-lo ao seu perfil no LinkedIn. Se quiser apenas ler e assistir o conteúdo do curso, pode participar como ouvinte sem custo.

Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.