Aspire Journeys
441 Network Operations Specialist Basic KSAT Journey
- 26 Courses | 31h 37m 51s
Plans, implements, and operates network services / systems, to include hardware and virtual environments
441 Network Operations Specialist Basic
Plans, implements, and operates network services / systems, to include hardware and virtual environments
- 26 Courses | 31h 37m 51s
COURSES INCLUDED
Agile Organizations: Cloud for Agile Software Development
The cloud has various deployment and service models that can be combined with Agile software development methodologies to help your organization design and create your very own cloud strategy based on your organization's needs. In this course, you'll learn about Agile software development, cloud management, cloud identity and access management, the cloud physical infrastructure, the cloud logical infrastructure, and cloud privacy. Next, you'll examine the available cloud deployment models such as public, private, hybrid, community, and virtual public clouds, as well as multi-cloud and multitenancy environments. You'll then move on to explore cloud service models such as Infrastructure as a Service, Platform as a Service, and Software as a Service. Finally, you'll learn about advanced topics such the Internet of Things.
14 videos |
1h 18m
Assessment
Badge
Microsoft Azure Fundamentals: Cloud Computing
The popularity of cloud computing has exploded in recent years. Organizations can streamline IT service efficiency with the use of cloud services in Microsoft Azure. In this course, explore five standard cloud computing characteristics: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Discover cloud deployment models like public, hybrid, and community, and look at cloud service models including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Examine core Azure items, such as data centers, regions, and availability zones. Finally, focus on using Azure Arc to manage on-premises and multi-cloud environments. This course can be used to prepare for exam AZ-900, Microsoft Azure Fundamentals.
11 videos |
1h
Assessment
Badge
Defining Cloud Computing for Decision-makers: Cloud Computing Principles
The cloud has various deployment and service models that can help an organization design their very own cloud strategy based on their needs. In this course, you'll learn about components of cloud computing including storage, compute, data management, monitoring, code management, and process and deployment management. Investigate cloud deployment models (public, private, hybrid, and community) and serverless architectures such as Backend as a Service (BaaS) and Function as a Service (FaaS). Explore cloud service models such as Infrastructure as a Service, Platform as a Service, and Software as a Service and discover common use cases for each. Finally, learn about cloud deployment architectures and security considerations including lack of control, data breaches, and compliance. After course completion, you'll be able to recognize cloud deployment and service models and key cloud security considerations.
15 videos |
1h 40m
Assessment
Badge
CompTIA IT Fundamentals: Basic IT Concepts
Computers are an integral part of our lives, both personally and professionally. In a few short decades, they have become so indispensable that understanding how they work and how to use them has become imperative. In this course, you will be introduced to basic information technology (IT) concepts, beginning with common numbering systems used by computers and the two international data standards. Then you will explore the character and numerical data types used in computer programming. Finally, you will learn about the basics of computer processing, inputs and outputs, the role of computer storage, and how it works. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
15 videos |
1h 49m
Assessment
Badge
CompTIA IT Fundamentals: Internet, Storage, & Computer Systems
When computers first hit the scene, they were a marvel and a mystery to most individuals, but accessibility improvements over time allowed them to become moderately more useful. They then began to extraordinarily change the world with the advent of the Internet. In this course, discover the role and features of the Internet, storage, and computer systems, beginning with the various Internet connection technologies and computer storage types. Next, learn about the various types of computers and the features of mobile phones, tablet devices, and gaming systems. Finally, explore an overview of the Internet of Things (IoT) and the technological advances that enable IoT. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
14 videos |
1h 29m
Assessment
Badge
CompTIA IT Fundamentals: Networking & Wireless Technologies
Computers are immensely useful tools that continue to change the world we live in. Arguably, they would be far less useful without the marvels that are computer networking and wireless technologies. In this course, explore concepts surrounding networking and wireless technologies, including the basics of networking and Internet protocols. Next, learn about the common protocols used every day for browsing the Internet and sending emails. Finally, examine networking devices, firewalls, and wireless technologies, as well as considerations for wireless quality and wireless best practices. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
19 videos |
2h 42m
Assessment
Badge
CompTIA IT Fundamentals: CIA Triad
Computer data is created at a rate that we can barely comprehend. Much of that information is immensely useful and readily available to anyone, but there is a large contingent of information that is and should remain confidential. In this course, you will explore the CIA triad, beginning with the principle of least privilege and concerns surrounding confidentiality, integrity, and availability. Then you will learn about methods for protecting information, including antivirus and antimalware software, firewalls, password security, and safe browsing. Finally, you will discover the importance of patching and updates, best practices for device security, and removing unwanted software. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
17 videos |
1h 43m
Assessment
Badge
CompTIA IT Fundamentals: Privacy & Encryption
In an information age, privacy and security are of paramount importance. We've seen numerous examples of the damage done when information is compromised. With this in mind, organizations spend vast resources to keep information safe and secure for good reason. In this course, you will learn about privacy and encryption, beginning with the basics of Internet and computing privacy. Then you'll explore software and network privacy considerations, security policies and procedures, regulations and considerations for handling information, and password best practices. Finally, you'll delve into encryption technologies and the importance of protecting data at rest and data in transit. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
15 videos |
1h 28m
Assessment
Badge
CompTIA A+ Core 1: Networking Fundamentals
In order for computers to be able to exchange data and share resources with each other, they must be interconnected in some fashion. This is referred to as computer networking. Explore computer networking fundamentals, including TCP and user datagram protocol (UDP) ports, and review common networking hardware devices. Examine the differences between hubs and bridges. Discover when to use a network switch and how a router can protect a system. Explore key differences between access points, repeaters, and extenders, as well as cable and DSL modems. Learn about the benefits of Power over Ethernet (PoE) and compare it with Ethernet over Power, which uses common electrical wiring to convey Ethernet connectivity. Lastly, take a look at the features of network interface cards (NIC), optical network terminal (ONT), and software-defined networking (SDN) technologies. This course will prepare you for the CompTIA A+ Core 1 (220-1101) certification exam.
14 videos |
1h 31m
Assessment
Badge
CompTIA A+ Core 1: Wireless Networking & Services
Wireless networks are much more versatile than wired networks, especially in an environment where running wires might be difficult. This course covers the most efficient wireless networking protocols for various scenarios. You will explore wireless frequencies and channels and learn how to differentiate between 802.11 standards: - a, - b, - g, - n, - ac, and - ax. Next, delve into considerations for working with long-range fixed wireless, including licensed, unlicensed, power, and regulatory requirements. You will also identify features of near-field communication (NFC) and radio-frequency identification (RFID). Finally, explore server roles such as domain name system (DNS) and dynamic host configuration protocol (DHCP), and discover the global market for Internet of things (IoT) end-user solutions. After completing this course, you'll be able to differentiate between wireless networking protocols and tune common host services. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification exam.
16 videos |
2h 25m
Assessment
Badge
CompTIA A+ Core 1: Networking Concepts & Configurations
Internet Protocol (IP) addresses, which are assigned to network-equipped devices that are part of a Transmission Control Protocol (TCP)/IP-based network, allow computers and other resources to communicate with each other. Explore the basics of IP addressing and networking concepts such as Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP). Begin with an overview of DNS and its benefits. Then take a closer look at the DHCP, its features, and the concept of reservations. Next, discover the use of virtual private networks (VPNs) and look at virtual local area networks (VLANs). Finally, explore the various networking tools including crimpers, Wi-Fi analyzers, and loopback plugs. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification exam.
14 videos |
1h 57m
Assessment
Badge
CompTIA A+ Core 1: Cloud Computing Concepts
Cloud computing allows users to store and access data and programs over the internet instead of a local hard drive. In this course, explore cloud computing concepts such as cloud model types, resource sharing, measure service, and virtual desktops. Discover the features of Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS); and learn how to differentiate between public, private, hybrid, and community cloud infrastructures. Discover key differences between internal and external shared resources and explore rapid elasticity, a feature that allows for scalable provisioning. Finally, examine the considerations and benefits of using a measured service or a metered service and investigate the types of virtual desktops and their purposes. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification.
11 videos |
1h 17m
Assessment
Badge
CompTIA A+ Core 2: Information Management & Change Management Processes
Ticketing systems are a great way to collect user and device information, descriptions of problems, and problem resolutions. This course will explore ticketing and asset management systems and how these systems capture information about events and resources. Explore document types such as acceptable use policies, compliance, and network topology diagrams. Discover components of a typical standard operating procedure, including procedures for custom installation of software packages. Next, consider the importance of knowledge base articles and explore best practices for documenting business processes, including rollback plans, sandbox testing, and responsible staff members. Lastly, explore considerations when explaining basic change management best practices. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
11 videos |
55m
Assessment
Badge
CompTIA A+ Core 2: Scripting & Remote Technologies
Remote access is accessing a computer or device from any location, including remotely administering networks and computing environments. Scripting is the process of automating tasks that would otherwise be performed individually by a human operator. In this course, discover how to leverage remote access technologies. First, learn the basics of scripting, including script file types, use cases, and other considerations for using scripts. Next, explore remote access methods and tools, and examine the security considerations of each access method. Finally, discover how to leverage remote access technologies and recognize remote access methods and tools, including the security considerations of each access method. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
12 videos |
1h 15m
Assessment
Badge
Cloud Data Platforms: Cloud Computing
Cloud computing has revolutionized the way we build, deploy, and maintain applications. Due to this paradigm shift, many businesses now rent rather than own IT infrastructure. This new way of approaching infrastructure requirements has given way to multiple cloud computing models, such as Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), and Function as a Service (FaaS). Knowing what your options are for cloud computing can help you choose the best models for your needs. Use this course to gain a solid foundational understanding of cloud computing. Compare various cloud service providers based on services, available tools, and pricing. Learn about real-life use cases for cloud computing and how businesses can benefit from this ever-evolving technological feat. When you've completed this course, your newfound knowledge of cloud computing will help you decide how it can help your business.
12 videos |
46m
Assessment
Badge
Firewall Filters
Security is a primary issue for modern networks, and Junos OS routing devices come with sophisticated firewall filter functionality. Explore firewall filter concepts, and how to configure firewall filters in Junos OS.
13 videos |
49m
Badge
Certified in Cybersecurity (CC): Core Security Principles & Risk Management
It is of high importance that organizations operate upon a solid foundation of security principles, concepts, and risk management. It is impossible to reduce security risk until core security and risk management principles are defined. In this course, explore the elements of the confidentiality, integrity, and availability (CIA) triad, along with the essentials of authentication and using non-repudiation services. Next, examine what risk is and the terminology surrounding risk management, threats, and vulnerability. Finally, learn about risk assessment, identification, and treatment and compare qualitative and quantitative risk analysis. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
11 videos |
32m
Assessment
Badge
Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
Security governance is a huge part of overall corporate or organizational governance. The security practitioner must be aware of various governance elements, regulations, laws, standards, policies, and procedures. Begin this course by exploring the elements of governance, including mission charter, leadership, and corporate guidance. Then investigate various laws and regulations like General Data Protection Regulation (GDPR) and HIPAA, standards issued by the International Organization for Standardization and International Electrotechnical Commission (ISO/IEC), and the National Institute of Standards and Technology (NIST), and common policies and standard operating procedures. Next, examine the International Information System Security Certification Consortium (ISC2) code of ethics. Finally, discover security control categories and types. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos |
25m
Assessment
Badge
Certified in Cybersecurity (CC): Incident Response
Practically anything that occurs in the enterprise can be called an event, but not all events are negative occurrences. It is the problematic events that are managed with the incident response practice. In this course, you will begin by exploring incident terminology and the goal of incident response. Next, discover the phases of the incident response lifecycle: Preparation, Detection and Analysis, Containment, and Post-incident Activities. Finally, you will explore additional incident response topics, including incident response teams, forensics, and problem management. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos |
28m
Assessment
Badge
Certified in Cybersecurity (CC): Business Continuity Planning
Many organizations nowadays have become aware of the need for business continuity planning, also known as continuity of operations. The main objective of a business continuity plan (BCP) is for an organization to maintain organizational operations while recovering from a major interruption. In this course, explore the importance and goals of business continuity and continuity of operations, as well as the components of a business continuity plan. Next, learn about business impact analysis (BIA), backup and restore policies, and disaster recovery plans. Finally, investigate the various tests and drills that incident response and business continuity plans should be subjected to. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos |
30m
Assessment
Badge
Certified in Cybersecurity (CC): Networking & Security Infrastructure
Although new security practitioners can come from development, database, or other backgrounds, the majority of security professionals come from a networking background. It is virtually impossible to separate networking knowledge from security expertise. Begin this course by exploring network types, network devices, and device addressing mechanisms. Then you will discover the Open Systems Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) reference models, logical ports, and the TCP handshake. Next, you will focus on transport layer security (TLS) and IP security (IPsec). Finally, you will examine virtual LANs (VLANs) and Wi-Fi fundamentals. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
12 videos |
45m
Assessment
Badge
Certified in Cybersecurity (CC): Data Security & System Hardening
For many organizations, data is the most critical asset to be secured. Begin this course by exploring the data life cycle, or the different phases a piece of data goes through, from data creation to data destruction. You will focus on each of the six phases, including create, store, use, share, archive, and destroy. Then, you will learn how to log and monitor security events using modern enterprise and cloud-based solutions. Next, you will investigate encryption, hashing, and digital signing. Finally, you will discover system hardening practices like patch management. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
11 videos |
29m
Assessment
Badge
Information Security for Leaders: An Introduction to InfoSec
Information security, often called InfoSec, consists of tools and processes used to protect data and sensitive information from threats and attacks. In this course, explore the history of information security and discover how to differentiate between cybersecurity and information security. Discover common myths and misconceptions about information security and learn about types of information security, such as infrastructure, cloud, application, and incident response. Next, you will explore security threats, including social media attacks, social engineering, malware, and misconfigurations, and common information security and data protection laws. Finally, you will investigate the responsibilities of a Chief Information Security Officer (CISO), including developing sound security practices, identifying security objectives, conducting awareness and training programs, and ensuring regulatory compliance. Upon completion, you'll be able to recognize the importance of information security and the key roles and responsibilities required to protect an organization
15 videos |
1h 18m
Assessment
Badge
Information Security for Leaders: Elements of InfoSec
Confidentiality, integrity, and availability, otherwise known as the CIA triad, is a common information security model used by organizations to design and implement their overall security policies and frameworks. In this course, you will learn the basics of confidentiality, integrity, and availability, and discover emerging challenges brought on by big data and the Internet of Things (IoT). Explore the stages of information security risk management (ISRM) and learn how to differentiate between various types of security controls. Discover techniques such as defense in depth, data classification, cryptography, access control, and governance, and the importance of having a sound incident response and management strategy in place. Lastly, learn about the role of investigations and forensics as well as the steps in a forensic investigation such as searching and seizing, acquisition, analysis, and reporting. After course completion, you'll be able to recognize common elements of information security.
15 videos |
1h 54m
Assessment
Badge
Cryptographic Methods
Cryptography uses different methods to protect data. Explore different methods used to protect or transmit data securely, and some of the components that ensure data can be protected.
8 videos |
27m
Assessment
Badge
Encryption Use & Analysis
Cryptography is far more than just selecting an algorithm and calling the encrypt or decrypt method. Explore secure communications using SSH, disk encryption, key strength considerations, cryptanalysis, and side-channel attacks.
8 videos |
33m
Assessment
Badge
EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE TRACKS
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.