Course
Information Technology
Continuing Education

IT Security: Defense against the digital dark arts

32 Hours

Estimated learning time

Self-Paced

Progress at your own speed

Popular course

A popular course among students

About the Course

Description

This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.

At the end of this course, you’ll understand:
● how various encryption algorithms and techniques work as well as their benefits and limitations.
● various authentication systems and types.
● the difference between authentication and authorization.
● how to evaluate potential risks and recommend ways to reduce risk.
● best practices for securing a network.
● how to help others to grasp security concepts and protect themselves.

This Course is part of a program

You can only buy it along with program.

Sections

Schedule

Asynchronous

Delivery method

Online

Deliverables

  • 0 Credits

    Academic Excellence

    Earn necessary number of credit hours for completing this content

  • Hone Important Skills

    Total Upgrade

    Such as Information Security, Security, System Security, Encryption, Wireless Security, Wireless, Cryptography, Network Security