Aspire Journeys
431 Knowledge Manager KSAT Beginner NCWF Journey
- 25 Courses | 31h 10m 44s
Knowledge Managers are responsible for the management and administration of processes and tools that enable the organization to identify, document, and access intellectual capital and information content
431 Knowledge Manager
Knowledge Managers are responsible for the management and administration of processes and tools that enable the organization to identify, document, and access intellectual capital and information content
- 25 Courses | 31h 10m 44s
COURSES INCLUDED
Microsoft 365 Fundamentals: Cloud Services & Principles
In this 12-video course focusing on cloud computing, in preparation for the Microsoft 365 Fundamentals (MS-900) Exam, learners can explore cloud concepts, and Microsoft 365 services, including product pricing and support. First, learn how security, compliance, and trust are protected in Microsoft 365. You will then learn about various cloud services, including ITaaS (IT as a service), SaaS (software as a service), IaaS (infrastructure as a service), and PaaS (platform as a service). The course uses a business case study to demonstrate cloud services and security principles; in it, you will examine public, private, and hybrid cloud services, and discuss their unique security issues. This course discusses security as it pertains to business, and will demonstrate how to see data security through the CIA (confidentiality, integrity, and availability) triad. You will examine encryption and multifactor authentication to protect information, and listen to a discussion of compliance issues for businesses adopting cloud solutions. Finally, explore the steps that go into creating a business case for a cloud solution.
12 videos |
42m
Assessment
Badge
Microsoft 365 Fundamentals: Skype for Business, Teams, & Collaboration
Microsoft 365, an integrated complete solution that allows users to work from everywhere while taking advantage of its security and device management capabilities, unleashes integrated collaboration tools that empower users in an organization. This 12-video course describes the various ways in which Microsoft 365 enables collaboration with Microsoft Teams, which provides integration with more than 140 apps and services and secure encryption, among other features. SharePoint Online, OneDrive, and Yammer. Other key topics covered include Azure; Skype for Business, a cloud-hosted communications solution with both audio and video components, which operates on multiple devices and can even be used with meeting room systems; and Microsoft Teams, a full-featured solution for hosting online meetings, live events, and video conferencing. A concluding exercise involves providing explanations of Skype, Teams, and collaboration, and their core features, elements, subscription options, and collaboration tools. The course can be used as part of preparations for the Microsoft 365 Fundamentals (MS-900) exam.
12 videos |
38m
Assessment
Badge
CompTIA A+ Core 2: Information Management & Change Management Processes
Ticketing systems are a great way to collect user and device information, descriptions of problems, and problem resolutions. This course will explore ticketing and asset management systems and how these systems capture information about events and resources. Explore document types such as acceptable use policies, compliance, and network topology diagrams. Discover components of a typical standard operating procedure, including procedures for custom installation of software packages. Next, consider the importance of knowledge base articles and explore best practices for documenting business processes, including rollback plans, sandbox testing, and responsible staff members. Lastly, explore considerations when explaining basic change management best practices. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
11 videos |
55m
Assessment
Badge
CompTIA IT Fundamentals: Internet, Storage, & Computer Systems
When computers first hit the scene, they were a marvel and a mystery to most individuals, but accessibility improvements over time allowed them to become moderately more useful. They then began to extraordinarily change the world with the advent of the Internet. In this course, discover the role and features of the Internet, storage, and computer systems, beginning with the various Internet connection technologies and computer storage types. Next, learn about the various types of computers and the features of mobile phones, tablet devices, and gaming systems. Finally, explore an overview of the Internet of Things (IoT) and the technological advances that enable IoT. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
14 videos |
1h 29m
Assessment
Badge
CompTIA IT Fundamentals: Networking & Wireless Technologies
Computers are immensely useful tools that continue to change the world we live in. Arguably, they would be far less useful without the marvels that are computer networking and wireless technologies. In this course, explore concepts surrounding networking and wireless technologies, including the basics of networking and Internet protocols. Next, learn about the common protocols used every day for browsing the Internet and sending emails. Finally, examine networking devices, firewalls, and wireless technologies, as well as considerations for wireless quality and wireless best practices. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
19 videos |
2h 42m
Assessment
Badge
CompTIA IT Fundamentals: Database Concepts
Computers require hardware and software to operate, but they also rely on data to be truly useful. Data comes in many forms and is an invaluable commodity in today's world. In order to make data useful, we use databases. In this course, you will learn about the basics of databases, beginning with what they are and how they're structured. Then you will dig into the common types of databases, database records, and basic database creation. Finally, you will explore database management systems, data manipulation and access methods, dumps and backups, and how to import and export databases. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
19 videos |
2h 9m
Assessment
Badge
CompTIA IT Fundamentals: CIA Triad
Computer data is created at a rate that we can barely comprehend. Much of that information is immensely useful and readily available to anyone, but there is a large contingent of information that is and should remain confidential. In this course, you will explore the CIA triad, beginning with the principle of least privilege and concerns surrounding confidentiality, integrity, and availability. Then you will learn about methods for protecting information, including antivirus and antimalware software, firewalls, password security, and safe browsing. Finally, you will discover the importance of patching and updates, best practices for device security, and removing unwanted software. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
17 videos |
1h 43m
Assessment
Badge
CompTIA IT Fundamentals: Privacy & Encryption
In an information age, privacy and security are of paramount importance. We've seen numerous examples of the damage done when information is compromised. With this in mind, organizations spend vast resources to keep information safe and secure for good reason. In this course, you will learn about privacy and encryption, beginning with the basics of Internet and computing privacy. Then you'll explore software and network privacy considerations, security policies and procedures, regulations and considerations for handling information, and password best practices. Finally, you'll delve into encryption technologies and the importance of protecting data at rest and data in transit. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
15 videos |
1h 28m
Assessment
Badge
Graph Data Structures: Understanding Graphs & Knowledge Graphs
Graphs are used to model a large number of real-world scenarios, including professional networks, flight networks, and schedules. Working in these problem domains involves a deep understanding of how graphs are represented and how graph algorithms work. Learn the basic components of a graph and how nodes and edges can be used to model relationships. Examine how domains such as social networks, purchases on an e-commerce platform, and connected devices can be modeled using graphs. Next, explore how to use an organizing principle to add semantic meaning and context to graphs. Discover how to apply higher-level organizing principles to knowledge graphs using taxonomies and ontologies. Finally, get hands-on experience creating and manipulating graphs, and running graph algorithms using the NetworkX library in Python. When you have completed this course, you will have a solid understanding of how graphs model entities and relationships in the real world.
12 videos |
1h 42m
Assessment
Badge
Database Fundamentals: Database Administration Basics
Once a database is part of your IT infrastructure, you need to protect and maintain it. You also have to ensure that it is operating at optimal capacity. This course focuses on the database administrator (DBA), the individual charged with building, maintaining, and backing up the database. Explore key responsibilities and tasks performed by the DBA involving the security, migration, troubleshooting, and configuration of databases. Discover how the role of the DBA compares to that of a database developer. Finally, learn about common maintenance functions performed for a database such as backup and restore, user management, and performance tuning. Upon completion of this course, you'll understand the role of a DBA and how the DBA's day-to-day responsibilities differ from those of a database developer.
10 videos |
54m
Assessment
Badge
Modern Data Management: Data Management Systems
As companies transition to the digital age, it is increasingly essential for decision-makers to utilize the vast amount of data in their systems properly. Proper governance and a working knowledge of data management systems ensure a significant competitive advantage, allowing companies to have more insight into their work and utilize their resources more efficiently. Use this course to familiarize yourself with the various strategies for handling and transacting data. Examine how data management systems work, study domain-wise data handling, and outline strategies to develop data management systems. Study how to integrate data management into different domains and identify and prioritize domains in various fields of data technologies and data architectures. When you're done with this course, you'll have a solid foundational comprehension of how to establish appropriate data management solutions in an organizational setting.
12 videos |
1h 2m
Assessment
Badge
Information Security for Leaders: An Introduction to InfoSec
Information security, often called InfoSec, consists of tools and processes used to protect data and sensitive information from threats and attacks. In this course, explore the history of information security and discover how to differentiate between cybersecurity and information security. Discover common myths and misconceptions about information security and learn about types of information security, such as infrastructure, cloud, application, and incident response. Next, you will explore security threats, including social media attacks, social engineering, malware, and misconfigurations, and common information security and data protection laws. Finally, you will investigate the responsibilities of a Chief Information Security Officer (CISO), including developing sound security practices, identifying security objectives, conducting awareness and training programs, and ensuring regulatory compliance. Upon completion, you'll be able to recognize the importance of information security and the key roles and responsibilities required to protect an organization
15 videos |
1h 18m
Assessment
Badge
Managing Enterprise InfoSec Risks & Risk Tolerance
IT security risks can be defined as a combination of the consequences of an event and the associated likelihood of occurrence. They can be managed by an organization through asset-safeguarding strategies. Through this course, learn about managing enterprise information security (InfoSec) risk and risk tolerance. Explore the definition of risk, how it differs from threats and vulnerabilities, and the history of information security. Next, discover common threats to IT systems and data, how to identify and manage security risks, and the key differences between quantitative and qualitative risk analysis. Finally, learn about common risk assessment tools and the differences between penetration testing and vulnerability assessments. Upon completion, you'll be able to outline and manage IT security risks.
15 videos |
1h 44m
Assessment
Badge
Information Security Practices: Multi-year InfoSec Planning
There is no easy way to predict the future of information security. There are however strategies leaders can implement to better plan and prepare for future growth, security, and threats. In this course, examine potential information security threats, how complexity makes them challenging to predict and plan for, and the threats that ransomware, cybercrime, and the growing crime-as-a-service (CaaS) community pose. Next, discover how work shortages and voids created by skills gaps can cause major issues and the impact of recent global pandemics. Finally, explore operational technology, application container risks, and the evolving risks posed by artificial intelligence and machine learning. Upon completion, you'll be able to plan for the future as an InfoSec leader.
15 videos |
1h 17m
Assessment
Badge
Information Security: Securing Networking Protocols
Learners can explore the key concept of the common protocols in use, and discover the security issues of the transmission control protocol/Internet protocol (TCP/IP) model and security protocols, in this 10-video course. You will begin by taking a look at the common protocols used in a network, the ports they use, and the type they are and what they do. Next, you will examine some of the security issues of the TCP/IP model at the layer level, of which it has four: application, transport, Internet, and data link. You will also explore the threats, vulnerabilities, and mitigation techniques in network security; identify the types of weak protocols and their replacements; and classify the various types of security protocols. Then learners will continue by examining various ways to use security protocols in different situations; the importance of implementing security protocols. In the final tutorial, learners will explore the security-first mindset and its necessity.
10 videos |
56m
Assessment
Badge
Cybersecurity Awareness: Getting Started with Security Foundations
As organizations become more reliant on IT systems to store all kinds of information, facilitate communication among colleagues and customers, and track business-related statistics, information is becoming more precious and its security increasingly crucial and challenging In this course, you'll explore standard information security concepts and the security-related roles within an organization. You'll examine where various security-related responsibilities fall throughout the organization and the importance of solid strategic planning and decision-making when implementing proper information security. You will also investigate the concept of security governance and the activities involved. Finally, you'll delve into the relationship between an organization's overall business objectives and how information security can promote these.
12 videos |
1h 14m
Assessment
Badge
Cybersecurity Awareness: Information Security Fundamentals
With information security a key concern for organizations, it is important to understand the basic concepts of information security and the security concepts that fall within this topic, such as those within the world of cybersecurity. In this course, you'll recall information security fundamentals before examining the broad domains within it. You'll then delve into cybersecurity and explore the various approaches to it. In addition, you'll examine some practical cybersecurity concepts, such as the CIA triad and the security architecture principle. You'll then investigate the actions that expose us to security risks, the roles we play in maintaining or breaching security, and the various security controls that can be implemented to mitigate security-related risks
16 videos |
1h 54m
Assessment
Badge
Cybersecurity Awareness: Key Security Terms & Concepts
Everyone who connects to the Internet is vulnerable to security threats. Managers need to know the types of security threats their organizations are vulnerable to and their potential impact. In this course, you'll explore the key terms used in cybersecurity. You'll examine different types of threats, threat actors, and targets. You'll investigate advanced persistent threats (APTs), insider threats, and uncertainty in relation to cybersecurity, as well as the various types of malware and security threats
17 videos |
2h 20m
Assessment
Badge
Cybersecurity Awareness: Exposure to Security Risks
There are security issues everywhere. Managers must keep abreast of security risks and threats. In this course, you'll identify standard security risks and their origins. You'll also learn about more diverse types of security issues and the potential threats to an organization's security. You'll be given examples from daily life that expose us to security risks. To wrap up, you'll outline effective methods to reduce common security risks that render organizations vulnerable via different channels.
11 videos |
1h 38m
Assessment
Badge
Certified in Cybersecurity (CC): Core Security Principles & Risk Management
It is of high importance that organizations operate upon a solid foundation of security principles, concepts, and risk management. It is impossible to reduce security risk until core security and risk management principles are defined. In this course, explore the elements of the confidentiality, integrity, and availability (CIA) triad, along with the essentials of authentication and using non-repudiation services. Next, examine what risk is and the terminology surrounding risk management, threats, and vulnerability. Finally, learn about risk assessment, identification, and treatment and compare qualitative and quantitative risk analysis. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
11 videos |
32m
Assessment
Badge
Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
Security governance is a huge part of overall corporate or organizational governance. The security practitioner must be aware of various governance elements, regulations, laws, standards, policies, and procedures. Begin this course by exploring the elements of governance, including mission charter, leadership, and corporate guidance. Then investigate various laws and regulations like General Data Protection Regulation (GDPR) and HIPAA, standards issued by the International Organization for Standardization and International Electrotechnical Commission (ISO/IEC), and the National Institute of Standards and Technology (NIST), and common policies and standard operating procedures. Next, examine the International Information System Security Certification Consortium (ISC2) code of ethics. Finally, discover security control categories and types. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos |
25m
Assessment
Badge
Certified in Cybersecurity (CC): Networking & Security Infrastructure
Although new security practitioners can come from development, database, or other backgrounds, the majority of security professionals come from a networking background. It is virtually impossible to separate networking knowledge from security expertise. Begin this course by exploring network types, network devices, and device addressing mechanisms. Then you will discover the Open Systems Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) reference models, logical ports, and the TCP handshake. Next, you will focus on transport layer security (TLS) and IP security (IPsec). Finally, you will examine virtual LANs (VLANs) and Wi-Fi fundamentals. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
12 videos |
45m
Assessment
Badge
Certified in Cybersecurity (CC): Present Threats & Network Security Controls
The constant emergence of new security threats, variants, vectors, and technologies is an ongoing challenge to keep up with. In this course, learn about threats, attacks, and threat prevention tools and methods, such as advanced persistent threats (APT) and intrusion detection and intrusion prevention systems. Next, investigate data center security, secure cloud computing, and elements of secure network design, including HVAC and environmental controls, zoning, and VLANs. Finally, explore Zero Trust security initiatives and micro-segmentation, such as network access control (NAC), software-defined networks, and IoT. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos |
38m
Assessment
Badge
Certified in Cybersecurity (CC): Data Security & System Hardening
For many organizations, data is the most critical asset to be secured. Begin this course by exploring the data life cycle, or the different phases a piece of data goes through, from data creation to data destruction. You will focus on each of the six phases, including create, store, use, share, archive, and destroy. Then, you will learn how to log and monitor security events using modern enterprise and cloud-based solutions. Next, you will investigate encryption, hashing, and digital signing. Finally, you will discover system hardening practices like patch management. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
11 videos |
29m
Assessment
Badge
Certified in Cybersecurity (CC): Security Best Practices & Security Awareness
A mature and successful organization will follow guidance and best practices to better secure all resources. Stakeholders at every level must understand their roles and responsibilities for contributing to a secure environment. In this course, the learner will begin by exploring common security policies, including acceptable use policies (AUPs) and remote access policies. You will then review the processes of configuration and change management. Finally, you will explore security awareness programs and topics, and the security awareness training life cycle. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
8 videos |
24m
Assessment
Badge
EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE TRACKS
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.YOU MIGHT ALSO LIKE
Rating 5.0 of 1 users
(1)