{"id":6722,"date":"2022-04-28T20:47:18","date_gmt":"2022-04-28T20:47:18","guid":{"rendered":"https:\/\/www.tun.com\/courses\/2019\/12\/23\/it-security-defense-against-the-digital-dark-arts\/"},"modified":"2022-04-28T20:47:18","modified_gmt":"2022-04-28T20:47:18","slug":"it-security-defense-against-the-digital-dark-arts","status":"publish","type":"post","link":"https:\/\/www.tun.com\/courses\/it-security-defense-against-the-digital-dark-arts\/google\/","title":{"rendered":"IT Security: Defense against the digital dark arts"},"content":{"rendered":"<div class=\"single_post\" style=\"margin-top:16px;\";>\n<div class=\"post-single-content box mark-links entry-content\">\n<div class=\"thecontent\">\n<h2>Description<\/h2>\n<p>This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We\u2019ll give you some background of encryption algorithms and how they\u2019re used to safeguard data. Then, we\u2019ll dive into the three As of information security: authentication, authorization, and accounting. We\u2019ll also cover network security solutions, ranging from firewalls to Wifi encryption options. Finally, we\u2019ll go through a case study, where we examine the security model of Chrome OS. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.<\/p>\n<p>At the end of this course, you\u2019ll understand:<br \/>\n\u25cf how various encryption algorithms and techniques work as well as their benefits and limitations.<br \/>\n\u25cf various authentication systems and types.<br \/>\n\u25cf the difference between authentication and authorization.<br \/>\n\u25cf how to evaluate potential risks and recommend ways to reduce risk.<br \/>\n\u25cf best practices for securing a network.<br \/>\n\u25cf how to help others to grasp security concepts and protect themselves.<\/p>\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"has-text-align-center\">Price: Enroll For Free!<\/h2>\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link has-text-color has-very-light-gray-color has-background has-vivid-red-background-color\" href=\"https:\/\/www.coursera.org\/learn\/it-security\">View Class<\/a><\/div>\n<div style=\"height:55px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\">\n<p class=\"has-text-align-center\"><em><strong>Language:<\/strong> <\/em>English<\/p>\n<\/div>\n<div class=\"wp-block-column\">\n<p class=\"has-text-align-center\"><em><strong>Subtitles<\/strong>: <\/em>English, Spanish, Portuguese (Brazilian), Arabic<\/p>\n<\/div>\n<\/div>\n<p style=\"background-color:#496d89\" class=\"has-text-color has-background has-text-align-center has-very-light-gray-color\"><a href=\"https:\/\/www.coursera.org\/learn\/it-security\">IT Security: Defense against the digital dark arts<strong> &#8211; Google<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We\u2019ll give you some background of encryption algorithms and how they\u2019re used to safeguard data. Then, we\u2019ll dive into the three As of information security: authentication, authorization, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":19481,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_uag_custom_page_level_css":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[153],"tags":[],"class_list":["post-6722","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-google"],"aioseo_notices":[],"uagb_featured_image_src":{"full":["https:\/\/www.tun.com\/courses\/wp-content\/uploads\/2019\/12\/Googleonline-education.png",375,225,false],"thumbnail":["https:\/\/www.tun.com\/courses\/wp-content\/uploads\/2019\/12\/Googleonline-education-150x150.png",150,150,true],"medium":["https:\/\/www.tun.com\/courses\/wp-content\/uploads\/2019\/12\/Googleonline-education-300x180.png",300,180,true],"medium_large":["https:\/\/www.tun.com\/courses\/wp-content\/uploads\/2019\/12\/Googleonline-education.png",375,225,false],"large":["https:\/\/www.tun.com\/courses\/wp-content\/uploads\/2019\/12\/Googleonline-education.png",375,225,false],"1536x1536":["https:\/\/www.tun.com\/courses\/wp-content\/uploads\/2019\/12\/Googleonline-education.png",375,225,false],"2048x2048":["https:\/\/www.tun.com\/courses\/wp-content\/uploads\/2019\/12\/Googleonline-education.png",375,225,false]},"uagb_author_info":{"display_name":"Axiom Pegasus","author_link":"https:\/\/www.tun.com\/courses\/author\/magic\/"},"uagb_comment_info":0,"uagb_excerpt":"Description This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We\u2019ll give you some background of encryption algorithms and how they\u2019re used to safeguard data. Then, we\u2019ll dive into the three As of information security: authentication, authorization,&hellip;","featured_media_src_url":"https:\/\/www.tun.com\/courses\/wp-content\/uploads\/2019\/12\/Googleonline-education.png","_links":{"self":[{"href":"https:\/\/www.tun.com\/courses\/wp-json\/wp\/v2\/posts\/6722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tun.com\/courses\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tun.com\/courses\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tun.com\/courses\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tun.com\/courses\/wp-json\/wp\/v2\/comments?post=6722"}],"version-history":[{"count":0,"href":"https:\/\/www.tun.com\/courses\/wp-json\/wp\/v2\/posts\/6722\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tun.com\/courses\/wp-json\/wp\/v2\/media\/19481"}],"wp:attachment":[{"href":"https:\/\/www.tun.com\/courses\/wp-json\/wp\/v2\/media?parent=6722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tun.com\/courses\/wp-json\/wp\/v2\/categories?post=6722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tun.com\/courses\/wp-json\/wp\/v2\/tags?post=6722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}