About this Course
This course covers all kinds of IT safety ideas, instruments, and finest practices. It introduces threats and assaults and the various methods they will present up. We’ll offer you some background of encryption algorithms and the way they’re used to safeguard information. Then, we’ll dive into the three As of data safety: authentication, authorization, and accounting. We’ll additionally cowl community safety options, starting from firewalls to Wifi encryption choices. The course is rounded out by placing all these parts collectively right into a multi-layered, in-depth safety structure, adopted by suggestions on tips on how to combine a tradition of safety into your group or group.
SKILLS YOU WILL GAIN
- Cybersecurity
- Wi-fi Safety
- Cryptography
- Community Safety
Syllabus – What you’ll study from this course
4 hours to finish
Understanding Safety Threats
Welcome to the IT Safety course of the IT Assist Skilled Certificates! Within the first week of this course, we’ll cowl the fundamentals of safety in an IT setting. We are going to discover ways to outline and acknowledge safety dangers, vulnerabilities and threats. We’ll determine the most typical safety assaults in a company and perceive how safety revolves across the “CIA” precept. By the tip of this module, you’ll know the sorts of malicious software program, community assaults, client-side assaults, and the important safety phrases you’ll see within the office.
6 hours to finish
Pelcgbybtl (Cryptology)
Within the second week of this course, we’ll study cryptology. We’ll discover several types of encryption practices and the way they work. We’ll present you the most typical algorithms utilized in cryptography and the way they’ve advanced over time. By the tip of this module, you’ll perceive how symmetric encryption, uneven encryption, and hashing work; you’ll additionally understand how to decide on probably the most acceptable cryptographic technique for a state of affairs you might even see within the office.
3 hours to finish
AAA Safety (Not Roadside Help)
Within the third week of this course, we’ll study in regards to the “three A’s” in cybersecurity. It doesn’t matter what sort of tech position you’re in, it’s vital to grasp how authentication, authorization, and accounting work inside a company. By the tip of this module, you’ll be capable to select probably the most acceptable technique of authentication, authorization, and stage of entry granted for customers in a company.
4 hours to finish
Securing Your Networks
Within the fourth week of this course, we’ll study safe community structure. It’s vital to know tips on how to implement safety measures on a community setting, so we’ll present you a number of the finest practices to guard a company’s community. We’ll study a number of the dangers of wi-fi networks and tips on how to mitigate them. We’ll additionally cowl methods to watch community site visitors and browse packet captures. By the tip of this module, you’ll perceive how VPNs, proxies and reverse proxies work; why 802.1X is an excellent vital for community safety; perceive why WPA/WPA2 is best than WEP; and know tips on how to use tcpdump to seize and analyze packets on a community. That’s loads of info, however nicely price it for an IT Assist Specialist to grasp!
0 Comments