Symmetric Cryptography in IT Security: Protection Against Digital Threats

Explore the fundamentals of symmetric cryptography and its crucial role in defending against various digital threats in the realm of IT security.

Symmetric Cryptography in IT Security: Protection Against Digital Threats
Dang Tu Quyen
7 views β€’ Nov 8, 2020
Symmetric Cryptography in IT Security: Protection Against Digital Threats

About this video

Link to this course:
https://click.linksynergy.com/deeplink?id=Gw/ETjJoU9M&mid=40328&murl=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fit-security
Symmetric Cryptography - IT Security: Defense against the digital dark arts
Google IT Support Specialization
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.

At the end of this course, you’ll understand:
● how various encryption algorithms and techniques work as well as their benefits and limitations.
● various authentication systems and types.
● the difference between authentication and authorization.
● how to evaluate potential risks and recommend ways to reduce risk.
● best practices for securing a network.
● how to help others to grasp security concepts and protect themselves.
Cybersecurity, Wireless Security, Cryptography, Network Security
This course was insane, all the possibilities, the potential for growth, and the different ways to help protect against cyber attacks. It was truly an eye-opening lesson in security. Thank you.,Great course a lot to learn and a lot to know along with great and cool teaching staff I enjoyed much and learned a lot. Thanks to all the teaching staff and google for such a wonderful course.
In the second week of this course, we'll learn about cryptology. We'll explore different types of encryption practices and how they work. We'll show you the most common algorithms used in cryptography and how they've evolved over time. By the end of this module, you'll understand how symmetric encryption, asymmetric encryption, and hashing work; you'll also know how to choose the most appropriate cryptographic method for a scenario you may see in the workplace.
Symmetric Cryptography - IT Security: Defense against the digital dark arts
Copyright Disclaimer under Section 107 of the copyright act 1976, allowance is made for fair use for purposes such as criticism, comment, news reporting, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favour of fair use.

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

7

Likes

1

Duration

5:27

Published

Nov 8, 2020

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.