This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. Finally, we’ll go through a case study, where we examine the security model of Chrome OS. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.
At the end of this course, you’ll understand:
- how various encryption algorithms and techniques work as well as their benefits and limitations.
- various authentication systems and types.
- the difference between authentication and authorization.
- how to evaluate potential risks and recommend ways to reduce risk.
- best practices for securing a network.
- how to help others to grasp security concepts and protect themselves.
IT support specialists
Yulia Ovchinnikova
Bringing people together around technology, enabling startups.
I help businesses and talent to connect through creating engaging & collaborative opportunities.
#HudsonValleyCanCode #HVTechFest
John Sturman
John Sturman has been working in and around software for more than 30 years as a technical writer, instructor, and project manager. He is a ScrumAlliance Certified Scrum Master as well as trained to facilitate groups with Liberating Structures, and has used his knowledge to train his students in a variety of courses.
Jack Lobianco
Jack possesses over 20 years of proven leadership in the information technology (IT) sector, covering roles in Integration Engineering, product management, and development of Windows tools and automation in financial services.
Jack has been a Delivery Manager for enterprise-wide financial services; he is successful managing customer and vendor relationships, leading extremely productive and motivated people and projects.