Aspire Journeys
441 Network Operations Specialist KSAT Beginner NCWF Journey
- 41 Courses | 49h 55m 53s
Network Operations Specialists plans, implements, and operates network services / systems, to include hardware and virtual environments.
441 Network Operations Specialist
Network Operations Specialists plans, implements, and operates network services / systems, to include hardware and virtual environments.
- 41 Courses | 49h 55m 53s
COURSES INCLUDED
CompTIA A+ Core 2: Information Management & Change Management Processes
Ticketing systems are a great way to collect user and device information, descriptions of problems, and problem resolutions. This course will explore ticketing and asset management systems and how these systems capture information about events and resources. Explore document types such as acceptable use policies, compliance, and network topology diagrams. Discover components of a typical standard operating procedure, including procedures for custom installation of software packages. Next, consider the importance of knowledge base articles and explore best practices for documenting business processes, including rollback plans, sandbox testing, and responsible staff members. Lastly, explore considerations when explaining basic change management best practices. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
11 videos |
55m
Assessment
Badge
CompTIA A+ Core 2: Scripting & Remote Technologies
Remote access is accessing a computer or device from any location, including remotely administering networks and computing environments. Scripting is the process of automating tasks that would otherwise be performed individually by a human operator. In this course, discover how to leverage remote access technologies. First, learn the basics of scripting, including script file types, use cases, and other considerations for using scripts. Next, explore remote access methods and tools, and examine the security considerations of each access method. Finally, discover how to leverage remote access technologies and recognize remote access methods and tools, including the security considerations of each access method. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
12 videos |
1h 15m
Assessment
Badge
CompTIA IT Fundamentals: Basic IT Concepts
Computers are an integral part of our lives, both personally and professionally. In a few short decades, they have become so indispensable that understanding how they work and how to use them has become imperative. In this course, you will be introduced to basic information technology (IT) concepts, beginning with common numbering systems used by computers and the two international data standards. Then you will explore the character and numerical data types used in computer programming. Finally, you will learn about the basics of computer processing, inputs and outputs, the role of computer storage, and how it works. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
15 videos |
1h 49m
Assessment
Badge
CompTIA IT Fundamentals: Internet, Storage, & Computer Systems
When computers first hit the scene, they were a marvel and a mystery to most individuals, but accessibility improvements over time allowed them to become moderately more useful. They then began to extraordinarily change the world with the advent of the Internet. In this course, discover the role and features of the Internet, storage, and computer systems, beginning with the various Internet connection technologies and computer storage types. Next, learn about the various types of computers and the features of mobile phones, tablet devices, and gaming systems. Finally, explore an overview of the Internet of Things (IoT) and the technological advances that enable IoT. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
14 videos |
1h 29m
Assessment
Badge
CompTIA IT Fundamentals: Networking & Wireless Technologies
Computers are immensely useful tools that continue to change the world we live in. Arguably, they would be far less useful without the marvels that are computer networking and wireless technologies. In this course, explore concepts surrounding networking and wireless technologies, including the basics of networking and Internet protocols. Next, learn about the common protocols used every day for browsing the Internet and sending emails. Finally, examine networking devices, firewalls, and wireless technologies, as well as considerations for wireless quality and wireless best practices. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
19 videos |
2h 42m
Assessment
Badge
CompTIA IT Fundamentals: Operating Systems
Computers need software to function, and that software has changed fundamentally since the very first computers were created. Nowadays, sophisticated operating systems (OSs) are used to perform everyday tasks. In this course, learn about computer operating systems, including the types and basic features of OSs and the application hardware interface. Next, explore Windows management, including managing applications, devices, users, and access control. Finally, investigate file systems, key OS features, task scheduling, and common methods for tweaking a Windows OS, including using command line interfaces (CLIs) to perform operations. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
18 videos |
2h 24m
Assessment
Badge
CompTIA IT Fundamentals: Software Development Concepts
Computer software is wonderful, but what makes it tick? Non-programmers might be interested to learn some of the basics of software development and how the magic is made. In this course, you will explore software development concepts, beginning with the basics of scripting, markup, programming, assembly, and query languages. Then you will delve into some of the tools used by programmers to map out program flow, including flowcharts, pseudocode, and sequence diagrams. Finally, you will discover common programming concepts, including branching and looping, variables and constants, arrays and vectors, functions, and object-oriented programming (OOP). This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
15 videos |
1h 11m
Assessment
Badge
CompTIA IT Fundamentals: CIA Triad
Computer data is created at a rate that we can barely comprehend. Much of that information is immensely useful and readily available to anyone, but there is a large contingent of information that is and should remain confidential. In this course, you will explore the CIA triad, beginning with the principle of least privilege and concerns surrounding confidentiality, integrity, and availability. Then you will learn about methods for protecting information, including antivirus and antimalware software, firewalls, password security, and safe browsing. Finally, you will discover the importance of patching and updates, best practices for device security, and removing unwanted software. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
17 videos |
1h 43m
Assessment
Badge
CompTIA IT Fundamentals: Privacy & Encryption
In an information age, privacy and security are of paramount importance. We've seen numerous examples of the damage done when information is compromised. With this in mind, organizations spend vast resources to keep information safe and secure for good reason. In this course, you will learn about privacy and encryption, beginning with the basics of Internet and computing privacy. Then you'll explore software and network privacy considerations, security policies and procedures, regulations and considerations for handling information, and password best practices. Finally, you'll delve into encryption technologies and the importance of protecting data at rest and data in transit. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
15 videos |
1h 28m
Assessment
Badge
Security Programming: Command Line Essentials
This 14-video course explores how to navigate a Linux command-line environment by showing learners how to use its most common tools, including text editing and processing, file monitoring and comparison, and package management. You will examine the common properties of the command line environment, including the bash shell, its properties, and the features of the PowerShell environment. This course next demonstrates how to perform text editing using commands such as nano; how to use the Linux EI library, Linux ED text editor; and text processing using commands such as sed awk, and cut. You will learn how to perform repeat actions, and the bash shell history, and perform process control tasks such as PS and kill. Then learn how to use the command line to schedule jobs, perform file and command monitoring, and perform file comparison using the diff command. Finally, this course demonstrates how to redirect the inputs and outputs of commands and files, and perform package management tasks by using the apt command.
14 videos |
56m
Assessment
Badge
Security Programming: System Essentials
In this 14-video course, learners will explore how Linux-based systems operate, communicate, and manage the underlying information they contain. Begin by examining management and monitoring tools available in Unix and Linux environments. Then learn to work with user accounts and domain names, and learn how to monitor user and system activity. You will learn how to securely connect to remote servers by using secure shell (SSH), and how to work with user accounts. This course examines elements of both an Internet Protocol routing table and a network interface, and demonstrates how to perform Domain Name System lookups. Learners will examine log files for monitoring critical events on a Linux system and use the PS command to retrieve process information. You will learn how to retrieve disk usage, partition information, and directory contents of a Linux system, and how to monitor both user and system activity on a Linux system. Finally, this course demonstrates how to configure time and date services and explore system configurations in the /etc folder of a Unix system.
14 videos |
56m
Assessment
Badge
Windows Exploits and Forensics: Intelligence Gathering
As a security operations person, you'll need to employ various Windows exploitation techniques to attack vulnerable target software and services. This course covers the various intelligence gathering techniques used for conducting offensive security operations against a Windows-based network to identify possible vulnerabilities. You'll start by examining open source intelligence (OSINT) gathering techniques and sources before conducting your own OSINT investigation. Next, you'll explore the use of social media and other tools for finding targets for social engineering exercises. You'll then examine common Windows services and their ports and tools for conducting basic enumeration. Moving along, you'll practice network scanning for open ports, scanning a Windows-based system, and enumerating data. Lastly, you'll explore various tools used in the Kali hacking environment, the use of Metasploitable, and common locations to find Windows exploits.
13 videos |
1h 27m
Assessment
Badge
Windows Environments
As a security operations person, you'll need to tailor your methods to suit the operating system your working with. This course covers some of the core competencies required to conduct offensive security operations against a Windows environment. Throughout this course, you'll learn how to recognize the differences between various Windows versions. You'll examine the role of intrusion detection systems (IDS) and intrusion prevention systems (IPS) in a Windows environment. You'll then learn about the MITRE ATT&CK framework and how it relates to Windows intrusions and identify the different Windows logging mechanisms. Next, you'll practice using event logging, basic PowerShell commands, and the Windows Registry. You'll then explore how the Windows hashing algorithm works and practice cracking an NTLM hash value. Lastly, you'll investigate different data artifacts within Windows and outline how best to work with Active Directory and Kerberos.
16 videos |
1h 31m
Assessment
Badge
CyberOps Windows Hardening: Windows Server Hardening Best Practices
Windows servers are the heart of many corporate networks and may contain sensitive company data that, if leaked or stolen by an attacker, would be catastrophic. Protecting the Windows Server assets and preventing a security compromise is an important skill for IT security professionals to master. In this course, you'll learn how to help prevent security incidents by hardening the Windows Server and reducing the attack surface. You'll learn how to follow common security best practices to lock down a Windows system by hardening user accounts, passwords, services, the file system, and common network services, such as DNS and IIS.
16 videos |
1h 32m
Assessment
Badge
CyberOps Windows Hardening: Windows Workstation Hardening Best Practices
If successful in exploiting your Windows workstations, hackers could move laterally across the network to compromise other assets like your servers and databases, which contain sensitive information. In this course, you'll learn how to protect your Windows workstations by following standard operating system hardening procedures to reduce the attack surface and help prevent a security compromise. You'll learn how to secure a workstation by implementing hardening procedures related to the BIOS/UEFI. You'll carry out user account and group membership security strategies. You'll practice reducing unneeded software, patching the system, configuring user rights, and setting up auditing. Additionally, you'll work with full disk encryption, antivirus methods, firewall software, and security templates. To carry out this work, you'll utilize BitLocker, AppLocker, and Windows Defender.
15 videos |
1h 29m
Assessment
Badge
Programming Fundamentals : Command Line Interface & Operating System Commands
In computer programming, commands are a common method of interacting with a computer to perform specific operations. A computer's command line interface (CLI) tool is used to enter, accept, and forward commands to the computer's operating system (OS). The commands and CLI will vary depending on the OS used (Microsoft, Linux, macOS, etc.) Use this course to get started with some of the most common commands used in Windows and Linux systems. Learn the commands that generate the most return in terms of productivity, such as engaging with files, folders, and programs. In doing this, become comfortable with using Windows and Linux CLIs. By the end of the course, you'll be able to execute the most frequently used commands on a Windows or Linux system.
12 videos |
1h 1m
Assessment
Badge
Information Security for Leaders: An Introduction to InfoSec
Information security, often called InfoSec, consists of tools and processes used to protect data and sensitive information from threats and attacks. In this course, explore the history of information security and discover how to differentiate between cybersecurity and information security. Discover common myths and misconceptions about information security and learn about types of information security, such as infrastructure, cloud, application, and incident response. Next, you will explore security threats, including social media attacks, social engineering, malware, and misconfigurations, and common information security and data protection laws. Finally, you will investigate the responsibilities of a Chief Information Security Officer (CISO), including developing sound security practices, identifying security objectives, conducting awareness and training programs, and ensuring regulatory compliance. Upon completion, you'll be able to recognize the importance of information security and the key roles and responsibilities required to protect an organization
15 videos |
1h 18m
Assessment
Badge
Managing Enterprise InfoSec Risks & Risk Tolerance
IT security risks can be defined as a combination of the consequences of an event and the associated likelihood of occurrence. They can be managed by an organization through asset-safeguarding strategies. Through this course, learn about managing enterprise information security (InfoSec) risk and risk tolerance. Explore the definition of risk, how it differs from threats and vulnerabilities, and the history of information security. Next, discover common threats to IT systems and data, how to identify and manage security risks, and the key differences between quantitative and qualitative risk analysis. Finally, learn about common risk assessment tools and the differences between penetration testing and vulnerability assessments. Upon completion, you'll be able to outline and manage IT security risks.
15 videos |
1h 44m
Assessment
Badge
Information Security Practices: Multi-year InfoSec Planning
There is no easy way to predict the future of information security. There are however strategies leaders can implement to better plan and prepare for future growth, security, and threats. In this course, examine potential information security threats, how complexity makes them challenging to predict and plan for, and the threats that ransomware, cybercrime, and the growing crime-as-a-service (CaaS) community pose. Next, discover how work shortages and voids created by skills gaps can cause major issues and the impact of recent global pandemics. Finally, explore operational technology, application container risks, and the evolving risks posed by artificial intelligence and machine learning. Upon completion, you'll be able to plan for the future as an InfoSec leader.
15 videos |
1h 17m
Assessment
Badge
Information Security: NACs & Gateways
Learners will discover key features of network access control (NAC), the importance of NAC in a network, various NAC elements, authentication, and its implementation, in this 12-video course. Explore the risks and challenges associated with BYOD-which means "bring your own device"-and IoT, which is Internet of Things. You will begin the course by examining the security risks introduced by BYOD and IoT, along with their preventive measures. You will then explore the major challenges with BYOD in an organization. The next tutorial defines NAC and the importance it has in a network. This leads into examining the NAC architecture; the different features of NAC; and the impact of an improperly configured NAC. You will learn about the various NAC elements; recall the best practices of implementing NAC, and identify the key points for creating an effective checklist for NAC security. In the final tutorial, learners will be asked to list the NAC authentication methods.
12 videos |
37m
Assessment
Badge
Information Security: Securing Networking Protocols
Learners can explore the key concept of the common protocols in use, and discover the security issues of the transmission control protocol/Internet protocol (TCP/IP) model and security protocols, in this 10-video course. You will begin by taking a look at the common protocols used in a network, the ports they use, and the type they are and what they do. Next, you will examine some of the security issues of the TCP/IP model at the layer level, of which it has four: application, transport, Internet, and data link. You will also explore the threats, vulnerabilities, and mitigation techniques in network security; identify the types of weak protocols and their replacements; and classify the various types of security protocols. Then learners will continue by examining various ways to use security protocols in different situations; the importance of implementing security protocols. In the final tutorial, learners will explore the security-first mindset and its necessity.
10 videos |
56m
Assessment
Badge
Information Security: Hardened Security Topologies
In this 8-video course, learners will discover the key concepts of different security topologies and the key role they play in network security. Begin with an introduction to security topologies, which define the network design based on security requirements. You will then explore the design goals for security topology, the elements used to ensure that the information is secure, which means that you need the concepts of confidentiality, integrity, and availability (CIA), of information in a proper way, and it needs to be secured. You also need to practice accountability along with CIA concepts. Next, you will examine advantages and disadvantages of different security topologies, which are the Intranet, the Internet, and various other topologies. You will take a look at the impact of integrating cloud topologies, and also delve into the various layers of security in cloud computing. The final tutorial in this course explores the different methods used to harden the components of security topologies.
8 videos |
42m
Assessment
Badge
Systems Engineering: An Introduction
Systems engineering is a holistic approach to engineering that considers the system, including its components, interactions, and environment. It aims to ensure that the system meets the needs and expectations of its stakeholders while satisfying technical, performance, and safety requirements. In this course, you will be introduced to systems engineering, beginning with a discussion of its systems engineering principles, the systems engineering life cycle, the systems engineering process, the V-model, the iterative process model, and lean engineering. Then you will learn about process integration, systems engineering and complex systems, and how systems engineering compares to similar disciplines. Finally, you will explore system types and engineering product development.
17 videos |
1h 37m
Assessment
Badge
Systems Engineering: Principles & Design Process
Systems engineering aims to ensure that the system meets the needs and expectations of its stakeholders while satisfying technical, performance, and safety requirements. To accomplish that feat, it's important to understand systems engineering principles, planning, and process design. In this course, you'll learn about engineering systems, beginning with the importance of engineering, the systems engineer role, engineered system context, and the impact of systems engineering on project management. Then you'll dig into the benefits of systems engineering, how systems engineers solve complex problems, and systems engineering plans and planning. Finally, you'll explore the engineering design process, its key principles and advantages, solving engineering design process problems, and how to create an engineering design process project.
17 videos |
1h 36m
Assessment
Badge
Systems Engineering: System Architecture & Design
Systems engineering involves a structured and iterative process of defining, analyzing, designing, validating, and verifying the system. System architecture and design are key elements of that process and require a significant amount of understanding in order to complement how everything works together in the system engineering process. In this course, you will explore system architecture and design, beginning with system architecture and components, system requirements, and modeling and simulation. Then you will learn about considerations for system requirements, system modularity, and standardization. Next, you will examine stakeholders and stakeholder needs and requirements. Finally, you will explore the principles of system design, investigate metrics for evaluating system designs, and find out how to evaluate a system.
18 videos |
1h 38m
Assessment
Badge
Systems Engineering: Systems Thinking
Systems Engineering requires effective communication and collaboration among various stakeholders, including customers, users, designers, developers, testers, and managers. Systems thinking is a way of understanding complexity and looking at systems in their entirety. In this course, you will begin with an introduction to systems thinking, its philosophy, and principles. Then you'll learn about the advantages of systems thinking, key systems thinking concepts, and common systems thinking tools. Finally, you'll look at systems thinking as it relates to systems engineering and how systems thinking can be applied to real-world problems.
9 videos |
44m
Assessment
Badge
Cybersecurity Awareness: Getting Started with Security Foundations
As organizations become more reliant on IT systems to store all kinds of information, facilitate communication among colleagues and customers, and track business-related statistics, information is becoming more precious and its security increasingly crucial and challenging In this course, you'll explore standard information security concepts and the security-related roles within an organization. You'll examine where various security-related responsibilities fall throughout the organization and the importance of solid strategic planning and decision-making when implementing proper information security. You will also investigate the concept of security governance and the activities involved. Finally, you'll delve into the relationship between an organization's overall business objectives and how information security can promote these.
12 videos |
1h 14m
Assessment
Badge
Cybersecurity Awareness: Information Security Fundamentals
With information security a key concern for organizations, it is important to understand the basic concepts of information security and the security concepts that fall within this topic, such as those within the world of cybersecurity. In this course, you'll recall information security fundamentals before examining the broad domains within it. You'll then delve into cybersecurity and explore the various approaches to it. In addition, you'll examine some practical cybersecurity concepts, such as the CIA triad and the security architecture principle. You'll then investigate the actions that expose us to security risks, the roles we play in maintaining or breaching security, and the various security controls that can be implemented to mitigate security-related risks
16 videos |
1h 54m
Assessment
Badge
Cybersecurity Awareness: Key Security Terms & Concepts
Everyone who connects to the Internet is vulnerable to security threats. Managers need to know the types of security threats their organizations are vulnerable to and their potential impact. In this course, you'll explore the key terms used in cybersecurity. You'll examine different types of threats, threat actors, and targets. You'll investigate advanced persistent threats (APTs), insider threats, and uncertainty in relation to cybersecurity, as well as the various types of malware and security threats
17 videos |
2h 20m
Assessment
Badge
Cybersecurity Awareness: Exposure to Security Risks
There are security issues everywhere. Managers must keep abreast of security risks and threats. In this course, you'll identify standard security risks and their origins. You'll also learn about more diverse types of security issues and the potential threats to an organization's security. You'll be given examples from daily life that expose us to security risks. To wrap up, you'll outline effective methods to reduce common security risks that render organizations vulnerable via different channels.
11 videos |
1h 38m
Assessment
Badge
Cloud Security Fundamentals: Cloud Data Security
In this 10-video course, you will learn about securing cloud data-at-rest and data-in-transit by using various cryptographic mechanisms and security controls offered by the cloud service provider. To begin, you will take a look at cryptographic mechanisms, and then move on to common cryptography protocols. In the next tutorial, you will compare client-side encryption (CSE) and server-side encryption (SSE), and then examine file and database security. You will explore object storage security, examples of which would be Google Cloud Storage and Amazon's S3, before taking a look at using key management services from the cloud service provider. Observe how to define public key infrastructure (PKI), which is based on asymmetric key cryptosystems. In the final tutorial in this course, you will be examining hardware security modules, or HSM. A module is a device or a modular component or a piece of hardware that protects and manages digital keys, which can be session keys, private keys, part of a PKI. The concluding exercise entails describing cloud data security.
10 videos |
47m
Assessment
Badge
Cloud Security Administration: Hardened Cloud Security
An important concept in cloud security is system and OS hardening, which can aid in reducing software vulnerability and provide data confidentiality and privacy. Hardening protects against exploitation of weaknesses in software, which could be applications, operating systems, or firmware. Vulnerability assessments and using penetration testing to discover issues in code or software can be used to protect the software. In this course, you'll learn about hardening, why it's important to decrease or eliminate security vulnerabilities, and best practices for software and hardware protection.
10 videos |
45m
Assessment
Badge
Certified in Cybersecurity (CC): Core Security Principles & Risk Management
It is of high importance that organizations operate upon a solid foundation of security principles, concepts, and risk management. It is impossible to reduce security risk until core security and risk management principles are defined. In this course, explore the elements of the confidentiality, integrity, and availability (CIA) triad, along with the essentials of authentication and using non-repudiation services. Next, examine what risk is and the terminology surrounding risk management, threats, and vulnerability. Finally, learn about risk assessment, identification, and treatment and compare qualitative and quantitative risk analysis. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
11 videos |
32m
Assessment
Badge
Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
Security governance is a huge part of overall corporate or organizational governance. The security practitioner must be aware of various governance elements, regulations, laws, standards, policies, and procedures. Begin this course by exploring the elements of governance, including mission charter, leadership, and corporate guidance. Then investigate various laws and regulations like General Data Protection Regulation (GDPR) and HIPAA, standards issued by the International Organization for Standardization and International Electrotechnical Commission (ISO/IEC), and the National Institute of Standards and Technology (NIST), and common policies and standard operating procedures. Next, examine the International Information System Security Certification Consortium (ISC2) code of ethics. Finally, discover security control categories and types. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos |
25m
Assessment
Badge
Certified in Cybersecurity (CC): Physical Access Controls
Many security practitioners learn about physical security by comparing it to protecting a medieval castle. Defense in Depth (DiD) relies on multiple layers of independent methods of security and must be used with either an outward-in or inward-out approach. Begin this course by exploring fundamental physical security concepts and mechanisms such as privileged access management (PAM) and segregation of duties (SoD). Then you will focus on badge systems, gate/facility entry, and environmental controls design. Next, you will examine biometric authentication, including crime prevention through environmental design (CPTED). Finally, you will learn about various monitoring systems like syslog, NetFlow, security information and event management (SIEM), and security orchestration, automation, and response (SOAR). This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos |
34m
Assessment
Badge
Certified in Cybersecurity (CC): Logical Access Controls
There is often a blurred line between physical and logical access control, as the systems typically function together. In this course, you will explore the logical aspect of Defense in Depth and security controls. Next, you will examine discretionary access control (DAC) and mandatory access control (MAC). Finally, you will define role-based access control (RBAC), rule-based access control (RuBAC), and attribute-based access control (ABAC) and learn about their differences. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
9 videos |
20m
Assessment
Badge
Certified in Cybersecurity (CC): Networking & Security Infrastructure
Although new security practitioners can come from development, database, or other backgrounds, the majority of security professionals come from a networking background. It is virtually impossible to separate networking knowledge from security expertise. Begin this course by exploring network types, network devices, and device addressing mechanisms. Then you will discover the Open Systems Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) reference models, logical ports, and the TCP handshake. Next, you will focus on transport layer security (TLS) and IP security (IPsec). Finally, you will examine virtual LANs (VLANs) and Wi-Fi fundamentals. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
12 videos |
45m
Assessment
Badge
Certified in Cybersecurity (CC): Present Threats & Network Security Controls
The constant emergence of new security threats, variants, vectors, and technologies is an ongoing challenge to keep up with. In this course, learn about threats, attacks, and threat prevention tools and methods, such as advanced persistent threats (APT) and intrusion detection and intrusion prevention systems. Next, investigate data center security, secure cloud computing, and elements of secure network design, including HVAC and environmental controls, zoning, and VLANs. Finally, explore Zero Trust security initiatives and micro-segmentation, such as network access control (NAC), software-defined networks, and IoT. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos |
38m
Assessment
Badge
Certified in Cybersecurity (CC): Data Security & System Hardening
For many organizations, data is the most critical asset to be secured. Begin this course by exploring the data life cycle, or the different phases a piece of data goes through, from data creation to data destruction. You will focus on each of the six phases, including create, store, use, share, archive, and destroy. Then, you will learn how to log and monitor security events using modern enterprise and cloud-based solutions. Next, you will investigate encryption, hashing, and digital signing. Finally, you will discover system hardening practices like patch management. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
11 videos |
29m
Assessment
Badge
Certified in Cybersecurity (CC): Security Best Practices & Security Awareness
A mature and successful organization will follow guidance and best practices to better secure all resources. Stakeholders at every level must understand their roles and responsibilities for contributing to a secure environment. In this course, the learner will begin by exploring common security policies, including acceptable use policies (AUPs) and remote access policies. You will then review the processes of configuration and change management. Finally, you will explore security awareness programs and topics, and the security awareness training life cycle. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
8 videos |
24m
Assessment
Badge
Secure Programmer: Intro to Programming Standards
In this course, learners can explore various IEEE programming standards, software requirement types, and requirements gathering techniques. Discover how software quality is defined and steps to take in the change management process. Begin this 10-video course with an introduction to basic programming and software engineering concepts. Then move on to a three-part tutorial on programming standards-part A on recalling IEEE programming standards including general, testing and quality, and maintenance and documentation standards; part B on IEEE standards, including NIST SP 800-27, ISO/IEC 15504 and 24744:2014, and ISO 29110; and part C on recalling IEEE and ISO programming standards. This leads into identifying software requirement types, the functionality, usability, reliability, performance, and supportability (FURPS) model, and the requirements gathering techniques. Next, you will explore requirements gathering techniques such as brainstorming, interviews, focus groups, and reverse engineering, and examine quality and the change management process. In the final tutorial, learners observe how to apply the IEEE Std 730 standard for software quality.
10 videos |
55m
Assessment
Badge
EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE TRACKS
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.YOU MIGHT ALSO LIKE
Rating 5.0 of 1 users
(1)
Rating 5.0 of 2 users
(2)
Rating 5.0 of 1 users
(1)