New App
Learn the core concepts needed to secure your organization's network as an IT security specialist. In this learning path, you'll cover all the foundations of IT security: from practical skills for securing hardware and network data to the basics of cryptography and cyber-crime investigation and response
‐ Learn the principles of IT security and cybersecurity.
‐ Develop practical skills for securing networks.
‐ Investigate cyber-crimes and know the basics of computer forensics
Course 01‐ IT Security Foundations: Core Concepts | duration: 01hrs 45mins
Computing and internet security are everyone's business, but it's especially critical for information technology specialists. Learning the core concepts of operating‐system and network‐level security helps avoid ongoing threats and eliminate system vulnerabilities. These topics are also key components of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98‐367).
Course 02‐ Cybersecurity Foundations | duration: 01hrs 55mins
Set a rock‐solid foundation for your network, users, and data by learning about the basics of cybersecurity. Security expert describes how to assess and mitigate risks using various cybersecurity frameworks and control standards, such as NIST, COBIT 5, and the Payment Card Industry Data Security Standard ﴾PCI DSS﴿
.
Course 03 ‐ IT Security Foundations: Operating System Security | duration: 02hrs 05mins
The operating system is where many attacks are targeted, which makes OS‐level security just as important to your organization as network security. OS security is also a key component of the Microsoft Technology Associate ﴾MTA﴿ Security Fundamentals exam ﴾98‐367﴿.
Course 04‐ IT Security Foundations: Network Security | duration: 02hrs 15mins
Network security is an important component of the Microsoft Technology Associate ﴾MTA﴿, Security Fundamentals exam ﴾98‐367﴿. this course, covers one of the main topics of the exam: securing an organization's network, to keep interconnected systems and data safe. The course introduces security devices such as firewalls and honeypots. In addition, she reviews the importance of isolating networks with VLANS and NAT addressing, along with a review of common security protocols.