Aspire Journeys

422 Data Analyst Basic NCWF KSAT Journey

  • 59 Courses | 65h 56m 12s
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
The 422 Data Analyst journey examines data from multiple disparate sources with the goal of providing security and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.

422 Data Analyst Basic

This track examines data from multiple disparate sources with the goal of providing security and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.

  • 59 Courses | 65h 56m 12s

COURSES INCLUDED

AWS Cloud Practitioner 2023: Access Management
A large aspect of the daily responsibilities of cloud security involves monitoring, controlling, and optimizing identity and access management (IAM) of cloud resources and services. In fact, IAM is at the top of the AWS security triad pyramid; the other two being infrastructure security and key management. In this course, you will explore the key concepts of IAM at AWS, beginning with the least privilege principle and root account protection. Then you will discover how to work with AWS IAM, AWS IAM Identity Center. Finally, you will compare multi-factor authentication options and define cross-account roles. This course is one of a collection that prepares learners for the AWS Certified Cloud Practitioner (CLF-C02) exam.
9 videos | 39m has Assessment available Badge
Azure AI Fundamentals: Artificial Intelligence & Machine Learning
Artificial Intelligence and machine learning in particular are solving a significant number of business and social problems and giving computers a new way to handle and process vast amounts of data. In this course, you'll learn about AI and machine learning concepts regarding regression, classification, and clustering algorithms. You'll explore how to manage datasets and work with labeled versus unlabeled data. You'll learn how supervised and unsupervised machine learning can be used, as well as how to build and use AIs safely, transparently, and fairly. This course is one of a collection that prepares learners for the Microsoft Azure AI Fundamentals (AI-900) exam.
18 videos | 1h 43m has Assessment available Badge
CompTIA A+ Core 2: Information Management & Change Management Processes
Ticketing systems are a great way to collect user and device information, descriptions of problems, and problem resolutions. This course will explore ticketing and asset management systems and how these systems capture information about events and resources. Explore document types such as acceptable use policies, compliance, and network topology diagrams. Discover components of a typical standard operating procedure, including procedures for custom installation of software packages. Next, consider the importance of knowledge base articles and explore best practices for documenting business processes, including rollback plans, sandbox testing, and responsible staff members. Lastly, explore considerations when explaining basic change management best practices. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
11 videos | 55m has Assessment available Badge
CompTIA A+ Core 2: Scripting & Remote Technologies
Remote access is accessing a computer or device from any location, including remotely administering networks and computing environments. Scripting is the process of automating tasks that would otherwise be performed individually by a human operator. In this course, discover how to leverage remote access technologies. First, learn the basics of scripting, including script file types, use cases, and other considerations for using scripts. Next, explore remote access methods and tools, and examine the security considerations of each access method. Finally, discover how to leverage remote access technologies and recognize remote access methods and tools, including the security considerations of each access method. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
12 videos | 1h 15m has Assessment available Badge
CompTIA IT Fundamentals: Basic IT Concepts
Computers are an integral part of our lives, both personally and professionally. In a few short decades, they have become so indispensable that understanding how they work and how to use them has become imperative. In this course, you will be introduced to basic information technology (IT) concepts, beginning with common numbering systems used by computers and the two international data standards. Then you will explore the character and numerical data types used in computer programming. Finally, you will learn about the basics of computer processing, inputs and outputs, the role of computer storage, and how it works. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
15 videos | 1h 49m has Assessment available Badge
CompTIA IT Fundamentals: Internet, Storage, & Computer Systems
When computers first hit the scene, they were a marvel and a mystery to most individuals, but accessibility improvements over time allowed them to become moderately more useful. They then began to extraordinarily change the world with the advent of the Internet. In this course, discover the role and features of the Internet, storage, and computer systems, beginning with the various Internet connection technologies and computer storage types. Next, learn about the various types of computers and the features of mobile phones, tablet devices, and gaming systems. Finally, explore an overview of the Internet of Things (IoT) and the technological advances that enable IoT. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
14 videos | 1h 29m has Assessment available Badge
CompTIA IT Fundamentals: Networking & Wireless Technologies
Computers are immensely useful tools that continue to change the world we live in. Arguably, they would be far less useful without the marvels that are computer networking and wireless technologies. In this course, explore concepts surrounding networking and wireless technologies, including the basics of networking and Internet protocols. Next, learn about the common protocols used every day for browsing the Internet and sending emails. Finally, examine networking devices, firewalls, and wireless technologies, as well as considerations for wireless quality and wireless best practices. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
19 videos | 2h 42m has Assessment available Badge
CompTIA IT Fundamentals: Operating Systems
Computers need software to function, and that software has changed fundamentally since the very first computers were created. Nowadays, sophisticated operating systems (OSs) are used to perform everyday tasks. In this course, learn about computer operating systems, including the types and basic features of OSs and the application hardware interface. Next, explore Windows management, including managing applications, devices, users, and access control. Finally, investigate file systems, key OS features, task scheduling, and common methods for tweaking a Windows OS, including using command line interfaces (CLIs) to perform operations. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
18 videos | 2h 24m has Assessment available Badge
CompTIA IT Fundamentals: Software Concepts
Computers are wonderful tools that require hardware to operate but need software and operating systems to truly sing. At one time, software was a rare commodity, but today we are faced with a wealth of choices for performing business or personal tasks. In this course, you will explore the basics of computer software concepts, beginning with various kinds of software (productivity, collaboration, and business) and application delivery methods. Then you will learn about architectural models, single-platform and cross-platform software, software licensing, and software installation best practices. Next, you will discover the ins and outs of web browsers, focusing on clearing caches, client-side and server-side scripting, and browser extensions. Finally, you will examine browser configuration and find out how to block popups and scripts. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
18 videos | 1h 49m has Assessment available Badge
CompTIA IT Fundamentals: Software Development Concepts
Computer software is wonderful, but what makes it tick? Non-programmers might be interested to learn some of the basics of software development and how the magic is made. In this course, you will explore software development concepts, beginning with the basics of scripting, markup, programming, assembly, and query languages. Then you will delve into some of the tools used by programmers to map out program flow, including flowcharts, pseudocode, and sequence diagrams. Finally, you will discover common programming concepts, including branching and looping, variables and constants, arrays and vectors, functions, and object-oriented programming (OOP). This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
15 videos | 1h 11m has Assessment available Badge
CompTIA IT Fundamentals: Database Concepts
Computers require hardware and software to operate, but they also rely on data to be truly useful. Data comes in many forms and is an invaluable commodity in today's world. In order to make data useful, we use databases. In this course, you will learn about the basics of databases, beginning with what they are and how they're structured. Then you will dig into the common types of databases, database records, and basic database creation. Finally, you will explore database management systems, data manipulation and access methods, dumps and backups, and how to import and export databases. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
19 videos | 2h 9m has Assessment available Badge
CompTIA IT Fundamentals: CIA Triad
Computer data is created at a rate that we can barely comprehend. Much of that information is immensely useful and readily available to anyone, but there is a large contingent of information that is and should remain confidential. In this course, you will explore the CIA triad, beginning with the principle of least privilege and concerns surrounding confidentiality, integrity, and availability. Then you will learn about methods for protecting information, including antivirus and antimalware software, firewalls, password security, and safe browsing. Finally, you will discover the importance of patching and updates, best practices for device security, and removing unwanted software. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
17 videos | 1h 43m has Assessment available Badge
CompTIA IT Fundamentals: Privacy & Encryption
In an information age, privacy and security are of paramount importance. We've seen numerous examples of the damage done when information is compromised. With this in mind, organizations spend vast resources to keep information safe and secure for good reason. In this course, you will learn about privacy and encryption, beginning with the basics of Internet and computing privacy. Then you'll explore software and network privacy considerations, security policies and procedures, regulations and considerations for handling information, and password best practices. Finally, you'll delve into encryption technologies and the importance of protecting data at rest and data in transit. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
15 videos | 1h 28m has Assessment available Badge
Malware Removal: Remediating an Infected System
Understanding what tools to use to recover a system after it is infected with malware is a critical skill. In this course, you'll explore the symptoms of virus infected systems and best practices for malware removal. You'll learn about different remediation approaches for different types of malware. You'll also look at some of the tools used to remove and recover systems after they have been infected such as the Windows Malicious Software Removal Tool, the Windows repair options, and how to restore a system image backup.
12 videos | 49m has Assessment available Badge
Security Programming: Command Line Essentials
This 14-video course explores how to navigate a Linux command-line environment by showing learners how to use its most common tools, including text editing and processing, file monitoring and comparison, and package management. You will examine the common properties of the command line environment, including the bash shell, its properties, and the features of the PowerShell environment. This course next demonstrates how to perform text editing using commands such as nano; how to use the Linux EI library, Linux ED text editor; and text processing using commands such as sed awk, and cut. You will learn how to perform repeat actions, and the bash shell history, and perform process control tasks such as PS and kill. Then learn how to use the command line to schedule jobs, perform file and command monitoring, and perform file comparison using the diff command. Finally, this course demonstrates how to redirect the inputs and outputs of commands and files, and perform package management tasks by using the apt command.
14 videos | 56m has Assessment available Badge
Security Programming: Code Identification
Learners can explore code recognition of various programming languages used in security applications, and security exploits, including Python, C, C++, and SQL, in this 14-video course. You will examine common programming paradigms, and learn how to classify them based on their features. Then you will learn how to identify Bash and Python scripts. Next, learners will examine the similarities and differences of C# compared to the C and C++ languages, and regular expressions in typical regex engines. You will learn how to identify PowerShell scripts based on their features, and how to identify the elements of a SQL statement, and how to use SQLite, a tool to manage local databases in file form without servers. This course continues by examining common security vulnerabilities in code that can lead to exploits. You will learn how to identify the structure of common executable formats based on their binary signatures. Finally, this course demonstrates how to verify the integrity of a downloaded file based on its hash value.
14 videos | 1h 8m has Assessment available Badge
Security Programming: Scripting Essentials
This 14-video course explores the basic elements of Bash and Python scripting by examining differences between the elements of a scripting language and a full-fledged computer program. In this course, learners examine how to use and set variables, to use conditional statements in both Bash scripts and a Bash shell, and to use important built-in variables in Bash. You will learn how to use the for, while, and until loops in a bash script, and create custom functions in Bash scripts. Next, learners will examine Python scripting language. This course then demonstrates how to work with variables, and conditional statements in Python scripts. You will watch demonstrations of how to use the for and while loops statements in a Python script, and how to create custom functions in a Python script. You will learn how to import external modules, and how to read and write in a Python script. Finally, you will learn how to perform file operations and make URL requests in Python scripts.
14 videos | 1h has Assessment available Badge
Security Programming: System Essentials
In this 14-video course, learners will explore how Linux-based systems operate, communicate, and manage the underlying information they contain. Begin by examining management and monitoring tools available in Unix and Linux environments. Then learn to work with user accounts and domain names, and learn how to monitor user and system activity. You will learn how to securely connect to remote servers by using secure shell (SSH), and how to work with user accounts. This course examines elements of both an Internet Protocol routing table and a network interface, and demonstrates how to perform Domain Name System lookups. Learners will examine log files for monitoring critical events on a Linux system and use the PS command to retrieve process information. You will learn how to retrieve disk usage, partition information, and directory contents of a Linux system, and how to monitor both user and system activity on a Linux system. Finally, this course demonstrates how to configure time and date services and explore system configurations in the /etc folder of a Unix system.
14 videos | 56m has Assessment available Badge
Security Programming: Bash Scripting Essentials
Bash is the default shell language in most server computing environments in Linux. The ability to leverage Bash scripting abilities for system administration and automation of tasks, including security, makes it an essential tool to understand and use. In this course, you'll navigate the vital elements of the Bash scripting language and analyze the output of common commands and scripts. You'll learn how to use Bash variables, conditionals, and loops and apply timing to a Bash script. You'll also learn how to change and list directories using Bash scripts, as well as how to change the ownership and permissions on files and folders. Next, you'll create files and custom functions, use piped commands to chain Bash scripts together, and redirect outputs using a Bash script.
14 videos | 58m has Assessment available Badge
Security Programming: PowerShell Scripting Essentials
PowerShell is the command shell and scripting language in the Microsoft Windows operating system. The ability to leverage PowerShell scripting abilities for system administration and automation of tasks, including security, makes it an essential tool to understand and use. In this course, you'll navigate basic elements of the PowerShell scripting language and analyze the output of common commands. You'll learn how to use PowerShell cmdlets, get object properties, and filter inputs. You'll then learn how to use variables, conditionals, and loops in a PowerShell script. You'll also learn how to get interactive help, create custom functions, use piped commands to chain PowerShell scripts together, and set the execution policy using a PowerShell script.
11 videos | 46m has Assessment available Badge
Security Programming: C & C++ Programs
"C and C++ are two of the most widely-used compiled languages for infrastructure and performance-critical applications. Mistakes and careless use of these tools can often lead to system and application crashes and security breaches through remote code execution. In this course, you'll learn and construct the essential elements of C and C++ code and generate binary files suitable for Linux and Windows operating systems. You'll work with variables and arrays in C/C++, and learn how to use vectors and standard containers in C++. Next, you'll learn how to use C/C++ conditional statements and loops, as well as how to perform string manipulation in both C and C++. Lastly, you'll learn how to define and call C/C++ functions, and how to work with pointers in a C program."
13 videos | 57m has Assessment available Badge
Windows Environments
As a security operations person, you'll need to tailor your methods to suit the operating system your working with. This course covers some of the core competencies required to conduct offensive security operations against a Windows environment. Throughout this course, you'll learn how to recognize the differences between various Windows versions. You'll examine the role of intrusion detection systems (IDS) and intrusion prevention systems (IPS) in a Windows environment. You'll then learn about the MITRE ATT&CK framework and how it relates to Windows intrusions and identify the different Windows logging mechanisms. Next, you'll practice using event logging, basic PowerShell commands, and the Windows Registry. You'll then explore how the Windows hashing algorithm works and practice cracking an NTLM hash value. Lastly, you'll investigate different data artifacts within Windows and outline how best to work with Active Directory and Kerberos.
16 videos | 1h 31m has Assessment available Badge
Cypher Query Language: Basic Reads & Writes with Cypher
This course introduces you to the breadth of operations which can be performed using the Cypher query language to add, modify, and delete nodes and relationships. Kick things off with queries that create multiple nodes and relationships in a single operation. Move on to MATCH queries where you search for relationships based on a variety of different patterns. Then, delve into the OPTIONAL MATCH clause to search based on partial pattern matches. Next, discover how to update operations where node properties are created, changed, or removed. Explore the MERGE clause in the Cypher language. This clause is similar to the CREATE clause but has a few notable differences that make it the better choice in many scenarios. Finally, learn how nodes and relationships in Neo4j can be removed and some of the rules around such operations. After completing this course you'll be able to add, modify, and delete nodes and relationships in a Neo4j database using the Cypher query language.
8 videos | 1h 4m has Assessment available Badge
Data Visualization: Best Practices for Creating Visuals
Most organizations depend on data visualization to help drive business decisions. Using the correct charts and graphs helps communicate the right information and identify patterns and trends within your data. You'll begin this course by identifying the importance of data visualization and its application in curating data that is easy to digest, understand, and interpret. Next, you'll discover best practices for visualizing data and the significance of creating user-centered visuals. You'll then explore different presentation types such as comparison, composition, distribution, trends, and relationship, and learn how to map your charts to these categories. Finally, you'll investigate the use cases for popular charts such as line charts, pie charts, histograms, scatter plots, and others. You'll also recognize when to use specialized charts such as Gantt charts, sunburst charts, and Sankey diagrams.
11 videos | 1h 3m has Assessment available Badge
Database Fundamentals: Database Concepts
Most businesses are unable to function without a database, even if it's just a filing cabinet. With more and more data coming from multiple sources comes an increased demand for secure and well-performing databases with adequate storage. Take this course to get a firm understanding of what exactly data means and why a database management system (DBMS) is so important for data management. Examine the origins of data and how it's stored and manipulated. Discover the different DBMS types. And learn about the roles and responsibilities involved in using a DBMS. Furthermore, find out how a DBMS can contribute to providing sound and reliable data. Navigate the MySQL Workbench to see the capabilities of an RDBMS (relational database management system) firsthand. After taking this course, you'll be able to recognize the features and capabilities of a reliable DBMS.
9 videos | 44m has Assessment available Badge
Database Fundamentals: Database Administration Basics
Once a database is part of your IT infrastructure, you need to protect and maintain it. You also have to ensure that it is operating at optimal capacity. This course focuses on the database administrator (DBA), the individual charged with building, maintaining, and backing up the database. Explore key responsibilities and tasks performed by the DBA involving the security, migration, troubleshooting, and configuration of databases. Discover how the role of the DBA compares to that of a database developer. Finally, learn about common maintenance functions performed for a database such as backup and restore, user management, and performance tuning. Upon completion of this course, you'll understand the role of a DBA and how the DBA's day-to-day responsibilities differ from those of a database developer.
10 videos | 54m has Assessment available Badge
Programming Fundamentals : Command Line Interface & Operating System Commands
In computer programming, commands are a common method of interacting with a computer to perform specific operations. A computer's command line interface (CLI) tool is used to enter, accept, and forward commands to the computer's operating system (OS). The commands and CLI will vary depending on the OS used (Microsoft, Linux, macOS, etc.) Use this course to get started with some of the most common commands used in Windows and Linux systems. Learn the commands that generate the most return in terms of productivity, such as engaging with files, folders, and programs. In doing this, become comfortable with using Windows and Linux CLIs. By the end of the course, you'll be able to execute the most frequently used commands on a Windows or Linux system.
12 videos | 1h 1m has Assessment available Badge
Programming Fundamentals: Introduction to Programming
The fundamentals of computer programming are not only for novice programmers. Knowing how humans manipulate computer programs can be game-changing for many other roles, such as UI designers, support engineers, or system administrators. This course acts as an introduction to programming for all. Discover the structure of a simple program, identifying the role of each part. Examine variables, looking at their types and purpose in a program. Dive into the role of functions, discovering how they use variables to achieve a result. Moving along, explore standard file operations, the use of a main method, the difference between compilation and interpretation, and different types of programming languages. When you're done, you'll be able to give a theoretical explanation of the elements and methods involved in programming.
12 videos | 55m has Assessment available Badge
Programming Fundamentals: Programming Best Practices
Like any valuable and skilled process, there are best practices established in computer programming that, if used, will make your work more effective in every respect. Use this course to become familiar with programming best practices at all phases of development. Firstly, examine the rationale for using standards and best practices in the programming world. Then, delve into the "how and why" behind multiple types of best practices. Among others, explore documentation, programming style, and integrated development environment (IDE) usage. As you advance, practice exception handling, as most beginner programmers introduce errors in their programs. Lastly, take a look at code review as a vital tool in developing good programs. When you're done, you'll be able to level up as a programmer by using game-changing best practices.
10 videos | 44m has Assessment available Badge
Software Design and Development: Version Control System
Computer programming has matured to the point where we can develop most business applications using three distinct technologies within the client-server framework. The three tiers of presentation, logic, and database (storage) lead to separate development teams in larger companies. This three-tier development means that code must be tested and synchronized before production. For this reason, version control of the entire code as a program is implemented. Explore the history of version control software and the most popular versioning systems, including Git. Take a deep dive into Git and discover its most important features. Then, install and configure Git on your local system before using Git to configure a project and create a workflow. Finally, branch out into GitHub's features and various version control activities. After this course you will be able to implement Git as a tool to keep track of the changes in your program.
11 videos | 54m has Assessment available Badge
Modern Data Management: Data Management Systems
As companies transition to the digital age, it is increasingly essential for decision-makers to utilize the vast amount of data in their systems properly. Proper governance and a working knowledge of data management systems ensure a significant competitive advantage, allowing companies to have more insight into their work and utilize their resources more efficiently. Use this course to familiarize yourself with the various strategies for handling and transacting data. Examine how data management systems work, study domain-wise data handling, and outline strategies to develop data management systems. Study how to integrate data management into different domains and identify and prioritize domains in various fields of data technologies and data architectures. When you're done with this course, you'll have a solid foundational comprehension of how to establish appropriate data management solutions in an organizational setting.
12 videos | 1h 2m has Assessment available Badge
Traditional Data Architectures: Data Warehousing and ETL Systems
Data warehouses are actively used for business intelligence and, because they integrate data from multiple sources, are advantageous to simple databases in many instances. Considering modern companies often have ETL-based data warehousing systems, decision-makers need to comprehend how they operate and are appropriately managed. In this course, learn the necessary concepts and processes required to work with and manage projects related to data warehousing. Study data warehousing architectures and schemas and investigate some core data warehouse elements, such as dimension, fact tables, and keys. Furthermore, examine the extract, transform, and load (ETL) approach for working with data warehouses, specifying process flow, tools, and software as well as best practices. When you're done, you'll know how to adopt data warehousing and ETL systems for your business intelligence and data management needs.
12 videos | 38m has Assessment available Badge
Version & Source Control: Basics
To work as a DevOps technical support engineer, you need a basic understanding of the growing number of version and source control tools. In this course, you'll explore the history of source control systems, examine how project management without source control differs from PM with source control, and recognize the control mechanisms used by Dev and Ops teams when working with control systems. You'll then identify the different types of source control systems and when to use them, and distinguish between cloud and cloudless version control systems. Next, you'll recognize the best practices for implementing version control in DevOps, and how to improve and measure the effectiveness of source control systems. Finally, you'll list the features of a source code repository and the primary source code repository providers.
15 videos | 1h has Assessment available Badge
Simple Descriptive Statistics
Along the career path to Data Science, a fundamental understanding of statistics and modeling is required. The goal of all modeling is generalizing as well as possible from a sample to the population of big data as a whole. In this 10-video Skillsoft Aspire course, learners explore the first step in this process. Key concepts covered here include the objectives of descriptive and inferential statistics, and distinguishing between the two; objectives of population and sample, and distinguishing between the two; and objectives of probability and non-probability sampling and distinguishing between them. Learn to define the average of a data set and its properties; the median and mode of a data set and their properties; and the range of a data set and its properties. Then study the inter-quartile range of a data set and its properties; the variance and standard deviation of a data set and their properties; and how to differentiate between inferential and descriptive statistics, the two most important types of descriptive statistics, and the formula for standard deviation.
10 videos | 1h 10m has Assessment available Badge
The Unix Command Line & GUI
Explore the Unix operating system command line and GUI. In this course, you will learn how to manage your Unix system through the command line; to execute common command line tasks, with standard syntax. Discover a variety of Unix shells, that are used to combine the tools to perform complex work flows. Learn how to switch between shells and the man-page viewer. Study Unix configuration file standards and log files. Edit files with the nano text editor. Explore and configure the X Window System and the Unix interface.
10 videos | 47m has Assessment available Badge
Shell Scripting
Learn shell scripts for Unix systems and discover various ways of filtering command line data. The Unix shell acts as a command line interpreter and typically controls operations such as file manipulation, program execution, and printing. During this course, you will learn to configure and execute a shell script and run Unix commands as background processes. Next, explore common shell script constructs, such as variables, conditional execution, and loops, to iterate through command sets. Examine various ways to filter and format commands and command line data. Finally, run regular expressions (regex) to search and filter data via grep and Awk commands.
11 videos | 52m has Assessment available Badge
Getting Started with PowerShell
Just starting with Windows PowerShell? Explore the PowerShell environment and Integrated Scripting Environment.
11 videos | 58m available Badge
Information Security for Leaders: An Introduction to InfoSec
Information security, often called InfoSec, consists of tools and processes used to protect data and sensitive information from threats and attacks. In this course, explore the history of information security and discover how to differentiate between cybersecurity and information security. Discover common myths and misconceptions about information security and learn about types of information security, such as infrastructure, cloud, application, and incident response. Next, you will explore security threats, including social media attacks, social engineering, malware, and misconfigurations, and common information security and data protection laws. Finally, you will investigate the responsibilities of a Chief Information Security Officer (CISO), including developing sound security practices, identifying security objectives, conducting awareness and training programs, and ensuring regulatory compliance. Upon completion, you'll be able to recognize the importance of information security and the key roles and responsibilities required to protect an organization
15 videos | 1h 18m has Assessment available Badge
Managing Enterprise InfoSec Risks & Risk Tolerance
IT security risks can be defined as a combination of the consequences of an event and the associated likelihood of occurrence. They can be managed by an organization through asset-safeguarding strategies. Through this course, learn about managing enterprise information security (InfoSec) risk and risk tolerance. Explore the definition of risk, how it differs from threats and vulnerabilities, and the history of information security. Next, discover common threats to IT systems and data, how to identify and manage security risks, and the key differences between quantitative and qualitative risk analysis. Finally, learn about common risk assessment tools and the differences between penetration testing and vulnerability assessments. Upon completion, you'll be able to outline and manage IT security risks.
15 videos | 1h 44m has Assessment available Badge
Information Security Practices: Multi-year InfoSec Planning
There is no easy way to predict the future of information security. There are however strategies leaders can implement to better plan and prepare for future growth, security, and threats. In this course, examine potential information security threats, how complexity makes them challenging to predict and plan for, and the threats that ransomware, cybercrime, and the growing crime-as-a-service (CaaS) community pose. Next, discover how work shortages and voids created by skills gaps can cause major issues and the impact of recent global pandemics. Finally, explore operational technology, application container risks, and the evolving risks posed by artificial intelligence and machine learning. Upon completion, you'll be able to plan for the future as an InfoSec leader.
15 videos | 1h 17m has Assessment available Badge
Information Security: NACs & Gateways
Learners will discover key features of network access control (NAC), the importance of NAC in a network, various NAC elements, authentication, and its implementation, in this 12-video course. Explore the risks and challenges associated with BYOD-which means "bring your own device"-and IoT, which is Internet of Things. You will begin the course by examining the security risks introduced by BYOD and IoT, along with their preventive measures. You will then explore the major challenges with BYOD in an organization. The next tutorial defines NAC and the importance it has in a network. This leads into examining the NAC architecture; the different features of NAC; and the impact of an improperly configured NAC. You will learn about the various NAC elements; recall the best practices of implementing NAC, and identify the key points for creating an effective checklist for NAC security. In the final tutorial, learners will be asked to list the NAC authentication methods.
12 videos | 37m has Assessment available Badge
Information Security: Securing Networking Protocols
Learners can explore the key concept of the common protocols in use, and discover the security issues of the transmission control protocol/Internet protocol (TCP/IP) model and security protocols, in this 10-video course. You will begin by taking a look at the common protocols used in a network, the ports they use, and the type they are and what they do. Next, you will examine some of the security issues of the TCP/IP model at the layer level, of which it has four: application, transport, Internet, and data link. You will also explore the threats, vulnerabilities, and mitigation techniques in network security; identify the types of weak protocols and their replacements; and classify the various types of security protocols. Then learners will continue by examining various ways to use security protocols in different situations; the importance of implementing security protocols. In the final tutorial, learners will explore the security-first mindset and its necessity.
10 videos | 56m has Assessment available Badge
Cybersecurity Awareness: Getting Started with Security Foundations
As organizations become more reliant on IT systems to store all kinds of information, facilitate communication among colleagues and customers, and track business-related statistics, information is becoming more precious and its security increasingly crucial and challenging In this course, you'll explore standard information security concepts and the security-related roles within an organization. You'll examine where various security-related responsibilities fall throughout the organization and the importance of solid strategic planning and decision-making when implementing proper information security. You will also investigate the concept of security governance and the activities involved. Finally, you'll delve into the relationship between an organization's overall business objectives and how information security can promote these.
12 videos | 1h 14m has Assessment available Badge
Cybersecurity Awareness: Information Security Fundamentals
With information security a key concern for organizations, it is important to understand the basic concepts of information security and the security concepts that fall within this topic, such as those within the world of cybersecurity. In this course, you'll recall information security fundamentals before examining the broad domains within it. You'll then delve into cybersecurity and explore the various approaches to it. In addition, you'll examine some practical cybersecurity concepts, such as the CIA triad and the security architecture principle. You'll then investigate the actions that expose us to security risks, the roles we play in maintaining or breaching security, and the various security controls that can be implemented to mitigate security-related risks
16 videos | 1h 54m has Assessment available Badge
Cybersecurity Awareness: Key Security Terms & Concepts
Everyone who connects to the Internet is vulnerable to security threats. Managers need to know the types of security threats their organizations are vulnerable to and their potential impact. In this course, you'll explore the key terms used in cybersecurity. You'll examine different types of threats, threat actors, and targets. You'll investigate advanced persistent threats (APTs), insider threats, and uncertainty in relation to cybersecurity, as well as the various types of malware and security threats
17 videos | 2h 20m has Assessment available Badge
Cybersecurity Awareness: Exposure to Security Risks
There are security issues everywhere. Managers must keep abreast of security risks and threats. In this course, you'll identify standard security risks and their origins. You'll also learn about more diverse types of security issues and the potential threats to an organization's security. You'll be given examples from daily life that expose us to security risks. To wrap up, you'll outline effective methods to reduce common security risks that render organizations vulnerable via different channels.
11 videos | 1h 38m has Assessment available Badge
Cloud Security Fundamentals: Architectural & Design Concepts
In this 9-video course, learners explore the fundamentals of cloud architecture and design, including three-tier design, shared responsibility, development lifecycles, risk management, and migration and deployment strategies. Begin by taking a look at a common three-tier design model, consisting of a web tier, an application tier, and a database tier model. You will also examine how to expand this into a four-tier model, for more granular visibility and security in the middle layers. The next tutorial concerns the importance of understanding the shared responsibility between your organization, your data center, your assets, your server farms, your development code, and your provider. Learners will then observe how to perform cost/benefit analysis for the cloud service provider (CSP). Also, you will explore common development lifecycles, and learn about the basics of risk management. Delve into common deployment and migration strategies, and the Cloud Security Alliance (CSA) cloud data lifecycle. In the final tutorial, learners will examine the basics of storage management lifecycles. The concluding exercise directs learners to describe cloud architecture concepts,
10 videos | 32m has Assessment available Badge
Defensive Programmer: Cryptography
This 8-video course helps learners explore the basics of programming cryptography, cryptography types, and applications, and also examines encryption implementation code examples. In the first of two tutorials on encryption concepts, you will explore the critical concepts of symmetric versus asymmetric cryptography, and when to use one as opposed to another, by learning the benefits of one over the other. In the second tutorial, learners will continue by examining specific algorithms such as AES, DES, RSA, Diffie-Hellman, and Elliptic Curve, and by looking into the strengths and weaknesses of these particular algorithms. Next, you will take a careful look at the important concepts of confidentiality and integrity, the use of hash codes, message authentication codes, and HMACs (hash message authentication codes). In the final four tutorials in this course, learners will explore specific code samples, where one can see Java cryptography, Python cryptography, C# cryptography, and Javascript cryptography being implemented.
8 videos | 31m has Assessment available Badge
Certified in Cybersecurity (CC): Core Security Principles & Risk Management
It is of high importance that organizations operate upon a solid foundation of security principles, concepts, and risk management. It is impossible to reduce security risk until core security and risk management principles are defined. In this course, explore the elements of the confidentiality, integrity, and availability (CIA) triad, along with the essentials of authentication and using non-repudiation services. Next, examine what risk is and the terminology surrounding risk management, threats, and vulnerability. Finally, learn about risk assessment, identification, and treatment and compare qualitative and quantitative risk analysis. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
11 videos | 32m has Assessment available Badge
Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
Security governance is a huge part of overall corporate or organizational governance. The security practitioner must be aware of various governance elements, regulations, laws, standards, policies, and procedures. Begin this course by exploring the elements of governance, including mission charter, leadership, and corporate guidance. Then investigate various laws and regulations like General Data Protection Regulation (GDPR) and HIPAA, standards issued by the International Organization for Standardization and International Electrotechnical Commission (ISO/IEC), and the National Institute of Standards and Technology (NIST), and common policies and standard operating procedures. Next, examine the International Information System Security Certification Consortium (ISC2) code of ethics. Finally, discover security control categories and types. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos | 25m has Assessment available Badge
Certified in Cybersecurity (CC): Physical Access Controls
Many security practitioners learn about physical security by comparing it to protecting a medieval castle. Defense in Depth (DiD) relies on multiple layers of independent methods of security and must be used with either an outward-in or inward-out approach. Begin this course by exploring fundamental physical security concepts and mechanisms such as privileged access management (PAM) and segregation of duties (SoD). Then you will focus on badge systems, gate/facility entry, and environmental controls design. Next, you will examine biometric authentication, including crime prevention through environmental design (CPTED). Finally, you will learn about various monitoring systems like syslog, NetFlow, security information and event management (SIEM), and security orchestration, automation, and response (SOAR). This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos | 34m has Assessment available Badge
Certified in Cybersecurity (CC): Logical Access Controls
There is often a blurred line between physical and logical access control, as the systems typically function together. In this course, you will explore the logical aspect of Defense in Depth and security controls. Next, you will examine discretionary access control (DAC) and mandatory access control (MAC). Finally, you will define role-based access control (RBAC), rule-based access control (RuBAC), and attribute-based access control (ABAC) and learn about their differences. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
9 videos | 20m has Assessment available Badge
Certified in Cybersecurity (CC): Networking & Security Infrastructure
Although new security practitioners can come from development, database, or other backgrounds, the majority of security professionals come from a networking background. It is virtually impossible to separate networking knowledge from security expertise. Begin this course by exploring network types, network devices, and device addressing mechanisms. Then you will discover the Open Systems Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) reference models, logical ports, and the TCP handshake. Next, you will focus on transport layer security (TLS) and IP security (IPsec). Finally, you will examine virtual LANs (VLANs) and Wi-Fi fundamentals. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
12 videos | 45m has Assessment available Badge
Certified in Cybersecurity (CC): Present Threats & Network Security Controls
The constant emergence of new security threats, variants, vectors, and technologies is an ongoing challenge to keep up with. In this course, learn about threats, attacks, and threat prevention tools and methods, such as advanced persistent threats (APT) and intrusion detection and intrusion prevention systems. Next, investigate data center security, secure cloud computing, and elements of secure network design, including HVAC and environmental controls, zoning, and VLANs. Finally, explore Zero Trust security initiatives and micro-segmentation, such as network access control (NAC), software-defined networks, and IoT. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos | 38m has Assessment available Badge
Certified in Cybersecurity (CC): Data Security & System Hardening
For many organizations, data is the most critical asset to be secured. Begin this course by exploring the data life cycle, or the different phases a piece of data goes through, from data creation to data destruction. You will focus on each of the six phases, including create, store, use, share, archive, and destroy. Then, you will learn how to log and monitor security events using modern enterprise and cloud-based solutions. Next, you will investigate encryption, hashing, and digital signing. Finally, you will discover system hardening practices like patch management. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
11 videos | 29m has Assessment available Badge
Certified in Cybersecurity (CC): Security Best Practices & Security Awareness
A mature and successful organization will follow guidance and best practices to better secure all resources. Stakeholders at every level must understand their roles and responsibilities for contributing to a secure environment. In this course, the learner will begin by exploring common security policies, including acceptable use policies (AUPs) and remote access policies. You will then review the processes of configuration and change management. Finally, you will explore security awareness programs and topics, and the security awareness training life cycle. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
8 videos | 24m has Assessment available Badge
Secure Programmer: Intro to Programming Standards
In this course, learners can explore various IEEE programming standards, software requirement types, and requirements gathering techniques. Discover how software quality is defined and steps to take in the change management process. Begin this 10-video course with an introduction to basic programming and software engineering concepts. Then move on to a three-part tutorial on programming standards-part A on recalling IEEE programming standards including general, testing and quality, and maintenance and documentation standards; part B on IEEE standards, including NIST SP 800-27, ISO/IEC 15504 and 24744:2014, and ISO 29110; and part C on recalling IEEE and ISO programming standards. This leads into identifying software requirement types, the functionality, usability, reliability, performance, and supportability (FURPS) model, and the requirements gathering techniques. Next, you will explore requirements gathering techniques such as brainstorming, interviews, focus groups, and reverse engineering, and examine quality and the change management process. In the final tutorial, learners observe how to apply the IEEE Std 730 standard for software quality.
10 videos | 55m has Assessment available Badge
Secure Programmer: Coding Practices
In this 12-video course, learners explore best practices for good coding along with exercises showcasing related examples. This includes good programming practices for Java, Python, C#, and Javascript. Begin with a look at how to perform software estimation of resources and time. One fundamental practice that learners need to know is how to estimate how long something will take and what resources one needs in place. You will then examine coding best practices, and some specific techniques to improve code, along with good coding examples. Following on from this, observe how to recognize bad coding examples, and examine Java code that is poorly written. Next, you will take a look at bad coding examples in Python, and recognizing bad Python programming; bad C# programming, and bad Javascript programing. This leads into learning about applying good coding examples in Java, in Python, in C#, and Javascript. The two most important takeaways from this course are understanding and recognizing both good and bad code, and the other is having a basic understanding of estimating and allocating resources.
12 videos | 46m has Assessment available Badge
Introducing API Fundamentals & Testing: Understanding APIs
Application programming interfaces (APIs) are crucial connectors enabling software systems to communicate. They establish rules for requesting and exchanging data, promoting efficient integration and standardized communication between applications. APIs are used in all kinds of applications, from finance and banking to the Internet of things (IoT). Begin this course by discovering how APIs allow you to integrate software systems, increase security, and standardize messages. Next, you will explore the different types of APIs, including Representational State Transfer (REST), simple object access protocol (SOAP), Graph Query Language (GraphQL), and Google Remote Procedure Call (gRPC). Finally, you will examine RESTful architecture in more detail and focus on best practices of API design and the importance of API versioning.
11 videos | 1h 34m has Assessment available Badge

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE TRACKS

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)