Security Trends: beginner
- 2 Courses | 2h 2m 41s
- 7 Books | 32h 48m
Security is essential to network and system administrators, and for organizations as a whole. Explore the aspects of security trends in detail.
COURSES INCLUDED
Attack Vectors & Mitigations
Cyber insurance is becoming more common as companies seek to protect their IT systems. During this course, you will explore potential security breach sources such as mobile and IoT devices. Topics include the pros and cons of workplace Bring Your Own Device (BYOD) policies; the risks of outsourcing your IT; how internet-connected devices, including wearable gadgets, may present security risks. You will also discover how Transport Layer Security (TLS) plays a key role, and learn how to protect stored data with encryption, such as BitLocker. As you progress through the course, you will explore how insecure databases can leak data; and learn how to evaluate cloud data security options, Data Loss Prevention (DLP), Multi-factor Authentication (MFA), cloud MFA, Single Sign-On (SSO), Identity Federation, and cyber insurance. You will conclude by listing common sources of security breaches and how to protect against them.
16 videos |
1h 12m
Assessment
Badge
Vulnerabilities and Exploits
Discover how common threat sources actually get exploited, in the world of web security. During this course, you will learn about white hat hackers, social engineers, phishing, social engineering attempts, exploit kits, ransomware, state sponsored hacking, and bug bounties. See how web-based applications have become more popular and what popularity means for data security. Look at Web Application Firewalls (WAFs), and how they protect web applications. Identify disaster recovery terms, such as BCP, DRP, RTO, and RPO. As a review exercise, you will describe how malicious users use tools to exploit vulnerabilities.
12 videos |
50m
Assessment
Badge
EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.BOOKS INCLUDED
Book
Cybersecurity Guidance for Small and Medium-Sized EnterprisesAddressing the SME scenario and its typical resources, budget and technical-skills limitations, this sample content offers SMEs a practical and manageable tool for planning, implementing and maintaining good cybersecurity at affordable cost.
7m
By ISACA
Book
The Complete Guide to Cybersecurity Risks and ControlsPresenting the fundamental concepts of information and communication technology (ICT) governance and control, this book, shows you how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data.
6h 24m
By Anne Kohnke, Dan Shoemaker, Ken Sigler
Book
Cybersecurity: Managing Systems, Conducting Testing, and Investigating IntrusionsA comprehensive and authoritative look at the critical topic of cybersecurity from start to finish, this essential book addresses cybersecurity strategies that include identity management, risk management, and incident management.
5h 44m
By Thomas J. Mowbray
Book
CompTIA Cybersecurity Analyst (CSA+) Study Guide: Exam CS0-001Helping you focus on your review for the CSA+, this guide provides real-world examples drawn from experts, hands-on labs, insight on how to create your own cybersecurity toolkit, and end-of-chapter review questions to help you gauge your understanding each step of the way.
8h 44m
By David Seidl, Mike Chapple
Book
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity CapabilitiesOffering step-by-step instruction for building, measuring, and optimizing cybersecurity capabilities, this book provides authoritative guidance for real-world situations, and cross-functional solutions for enterprise-wide improvement.
6h 46m
By Domenic Antonucci
Book
Cryptography and Network Security: A Practical ApproachNetwork security is a set of protocols that allows us to use the internet comfortably without worrying about security attacks, and the most common tool for providing network security is cryptography. This book provides a practical survey of the principles of cryptography and network security.
3h 55m
By K. Haribaskar
Book
Network Hardening: An Automated Approach to Improving Network SecurityExamining the tools based on attack graphs that help reveal network hardening threats, this book provides an improved technique that considers the dependencies between hardening options and employs a near-optimal approximation algorithm to scale linearly with the size of the inputs.
1h 8m
By Lingyu Wang, Massimiliano Albanese, Sushil Jajodia
SHOW MORE
FREE ACCESS