End User Security: IT Security beginner
- 2 Courses | 1h 30m 18s
- 8 Books | 31h 11m
- Includes Lab
Security is a primary concern for enterprises. Discover the basics of end user security, from methods, tools, and technologies.
GETTING STARTED
An Executive's Guide to Security: Understanding Security Threats
-
1m 9s
-
4m 21s
COURSES INCLUDED
An Executive's Guide to Security: Understanding Security Threats
Companies that do not understand threats facing their information are at risk of costly data breaches. In this 13-video course, learners can explore common security threats, types of network attacks, and the human element of security threats. Key concepts covered here include what an attack surface is, and how it must be understood to protect corporate information; and what network hardening is and how it relates to protection of corporate information. Next, learners will examine network demilitarized zones and how they protect corporate information; observe differences between threats, vulnerabilities, and risks in corporate environments; and study top kinds of security threats facing organizations today. Continue by learning the role that physical security plays in protecting corporate data; how social engineering is conducted and how it is mitigated through corporate policy; and the importance of corporate security policies, and why they should be strictly adhered to. Finally, explore the importance of password policies and why they should be adhered to; and learn reasons why IT administrators need to protect an organization by refusing to bend rules.
13 videos |
44m
Assessment
Badge
An Executive's Guide to Security: Protecting Your Information
This 13-video course explores data protection for businesses, including devices, social media, and good governance through security principles, policies, and programs. You will examine several types of security threats, the different types of network attacks, the role physical security plays in the protection of corporate data, and the human element of security threats. Next, learners examine the attack surface, including the total combined nodes, users, devices, and any entry points of software, a network, and a business environment. You will examine threats, vulnerabilities, and risks, and learn the importance of network hardening. This course uses real-world examples of several top security threats to businesses today, including malware, social engineering, unpatched software, BYOD (bring your own device), and IoT (Internet of things). You will examine clickjacking and URL spoofing. Finally, this course discusses the legal and financial ramifications of a major security breach, the importance of having a security policy, training personnel, password protection, and managing a company's security.
13 videos |
45m
Assessment
Badge
EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.BOOKS INCLUDED
Book
Information Technology Security FundamentalsAssisting managers in understanding the role of IT Security in their enterprise, this book defines security from an organizational perspective, then builds upon that by discussing issues related to low-level technologies and higher level management issues like security policy.
2h 41m
By Bryan Hosack, Glen Sagers
Book
Social Engineering in IT Security: Tools, Tactics, and TechniquesWritten by a global expert on the topic, this book discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results.
5h 55m
By Sharon Conheady
Book
100 Top Tips - Stay Safe Online and Protect Your Privacy in Easy StepsRecognizing the threats you may encounter online is the first step to preventing them, and a good understanding of online security and privacy issues is essential to protecting yourself from them. Read this book to find out more.
1h 15m
By Nick Vandome
Book
Cyber Safety for Everyone 2nd EditionBook is a step-by-step guide that handholds you through all the essential aspects of internet safety. The content is presented in a simple and easy-to-understand manner. True incidents, practical tips, survey results, conversation starters and teaching ideas given in the book, make the reading experience truly enriching.
2h 56m
By Jaago Teens
Book
The Smart Girl's Guide to Privacy: Practical Tips for Staying Safe OnlineHelping you cut through the confusion and start protecting your online life, this book offers practical, user-friendly advice and shows you how women are targeted online and how to keep yourself safe.
2h 14m
By Violet Blue
Book
Cybercrime: Protecting Your Business, Your Family and YourselfThis book aims to prepare you to defend yourself against the tactics cybercriminals use, and gives you advice on what you can do if you, or your business, does fall victim to cybercrime.
3h 36m
By Todd Wade
Book
The Basics of Cyber Safety: Computer and Mobile Device Safety Made EasyProviding the most straightforward and up-to-date guide to cyber safety for anyone who ventures online for work, school, or personal use, this book includes real world examples that demonstrate how cyber criminals commit their crimes, and what users can do to keep their data safe.
5h 42m
By John Sammons, Michael Cross
Book
Cybersecurity For Dummies, 2nd EditionCybersecurity For Dummies is the ideal handbook for anyone considering a career transition into cybersecurity, as well as anyone seeking to secure sensitive information.
6h 52m
By Joseph Steinberg
SHOW MORE
FREE ACCESS