Aspire Journeys

451 System Administrator Basic KSAT journey

  • 46 Courses | 59h 9m 16s
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Responsible for setting up and maintaining a system or specific components of a system (e.g. for example, installing, configuring, and updating hardware and software; establishing and managing user accounts; overseeing or conducting backup and recovery tasks; implementing operational and technical security controls; and adhering to organizational security policies and procedures).

451 System Administrator Basic

Responsible for setting up and maintaining a system or specific components of a system (e.g. for example, installing, configuring, and updating hardware and software; establishing and managing user accounts; overseeing or conducting backup and recovery tasks; implementing operational and technical security controls; and adhering to organizational security policies and procedures).

  • 46 Courses | 59h 9m 16s

COURSES INCLUDED

Agile Organizations: Cloud for Agile Software Development
The cloud has various deployment and service models that can be combined with Agile software development methodologies to help your organization design and create your very own cloud strategy based on your organization's needs. In this course, you'll learn about Agile software development, cloud management, cloud identity and access management, the cloud physical infrastructure, the cloud logical infrastructure, and cloud privacy. Next, you'll examine the available cloud deployment models such as public, private, hybrid, community, and virtual public clouds, as well as multi-cloud and multitenancy environments. You'll then move on to explore cloud service models such as Infrastructure as a Service, Platform as a Service, and Software as a Service. Finally, you'll learn about advanced topics such the Internet of Things.
14 videos | 1h 18m has Assessment available Badge
Microsoft Azure Fundamentals: Cloud Computing
The popularity of cloud computing has exploded in recent years. Organizations can streamline IT service efficiency with the use of cloud services in Microsoft Azure. In this course, explore five standard cloud computing characteristics: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Discover cloud deployment models like public, hybrid, and community, and look at cloud service models including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Examine core Azure items, such as data centers, regions, and availability zones. Finally, focus on using Azure Arc to manage on-premises and multi-cloud environments. This course can be used to prepare for exam AZ-900, Microsoft Azure Fundamentals.
11 videos | 1h has Assessment available Badge
Defining Cloud Computing for Decision-makers: Cloud Computing Principles
The cloud has various deployment and service models that can help an organization design their very own cloud strategy based on their needs. In this course, you'll learn about components of cloud computing including storage, compute, data management, monitoring, code management, and process and deployment management. Investigate cloud deployment models (public, private, hybrid, and community) and serverless architectures such as Backend as a Service (BaaS) and Function as a Service (FaaS). Explore cloud service models such as Infrastructure as a Service, Platform as a Service, and Software as a Service and discover common use cases for each. Finally, learn about cloud deployment architectures and security considerations including lack of control, data breaches, and compliance. After course completion, you'll be able to recognize cloud deployment and service models and key cloud security considerations.
15 videos | 1h 40m has Assessment available Badge
Cloud Data Platforms: Cloud Computing
Cloud computing has revolutionized the way we build, deploy, and maintain applications. Due to this paradigm shift, many businesses now rent rather than own IT infrastructure. This new way of approaching infrastructure requirements has given way to multiple cloud computing models, such as Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), and Function as a Service (FaaS). Knowing what your options are for cloud computing can help you choose the best models for your needs. Use this course to gain a solid foundational understanding of cloud computing. Compare various cloud service providers based on services, available tools, and pricing. Learn about real-life use cases for cloud computing and how businesses can benefit from this ever-evolving technological feat. When you've completed this course, your newfound knowledge of cloud computing will help you decide how it can help your business.
12 videos | 46m has Assessment available Badge
CompTIA IT Fundamentals: Data, CPUs, & Troubleshooting
What goes on under the hood of computers is a marvel of human ingenuity that most people don't stop to consider, even though computers are never far away in our professional or private lives. In this course, you will explore the basics of data, CPUs, and troubleshooting, beginning with an overview of data and information as assets, intellectual property and digital products, and data-driven business decisions. Then you will discover processors, data storage measurements, and throughput measurements. Finally, you will focus on troubleshooting, including the methodology used for preventing, detecting, and remedying the problem. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
18 videos | 1h 59m has Assessment available Badge
CompTIA IT Fundamentals: Computer Devices & Components
By modern standards, computer setups are no longer as simple as requiring a box, keyboard, mouse, and monitor. Other peripherals in the past were optional and not nearly as common as they are now. In this course, explore concepts for computer devices and components, such as the basics of computer networking. Next, learn about various peripherals, including setup steps and installation methods. Finally, examine the insides of computers with an overview of motherboards, BIOS and firmware, CPUs and RAM, storage types, cooling systems, and network interface cards (NICs). This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
17 videos | 2h 41m has Assessment available Badge
CompTIA IT Fundamentals: Internet, Storage, & Computer Systems
When computers first hit the scene, they were a marvel and a mystery to most individuals, but accessibility improvements over time allowed them to become moderately more useful. They then began to extraordinarily change the world with the advent of the Internet. In this course, discover the role and features of the Internet, storage, and computer systems, beginning with the various Internet connection technologies and computer storage types. Next, learn about the various types of computers and the features of mobile phones, tablet devices, and gaming systems. Finally, explore an overview of the Internet of Things (IoT) and the technological advances that enable IoT. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
14 videos | 1h 29m has Assessment available Badge
CompTIA IT Fundamentals: Networking & Wireless Technologies
Computers are immensely useful tools that continue to change the world we live in. Arguably, they would be far less useful without the marvels that are computer networking and wireless technologies. In this course, explore concepts surrounding networking and wireless technologies, including the basics of networking and Internet protocols. Next, learn about the common protocols used every day for browsing the Internet and sending emails. Finally, examine networking devices, firewalls, and wireless technologies, as well as considerations for wireless quality and wireless best practices. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
19 videos | 2h 42m has Assessment available Badge
CompTIA IT Fundamentals: Basic IT Concepts
Computers are an integral part of our lives, both personally and professionally. In a few short decades, they have become so indispensable that understanding how they work and how to use them has become imperative. In this course, you will be introduced to basic information technology (IT) concepts, beginning with common numbering systems used by computers and the two international data standards. Then you will explore the character and numerical data types used in computer programming. Finally, you will learn about the basics of computer processing, inputs and outputs, the role of computer storage, and how it works. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
15 videos | 1h 49m has Assessment available Badge
CompTIA IT Fundamentals: Operating Systems
Computers need software to function, and that software has changed fundamentally since the very first computers were created. Nowadays, sophisticated operating systems (OSs) are used to perform everyday tasks. In this course, learn about computer operating systems, including the types and basic features of OSs and the application hardware interface. Next, explore Windows management, including managing applications, devices, users, and access control. Finally, investigate file systems, key OS features, task scheduling, and common methods for tweaking a Windows OS, including using command line interfaces (CLIs) to perform operations. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
18 videos | 2h 24m has Assessment available Badge
CompTIA IT Fundamentals: CIA Triad
Computer data is created at a rate that we can barely comprehend. Much of that information is immensely useful and readily available to anyone, but there is a large contingent of information that is and should remain confidential. In this course, you will explore the CIA triad, beginning with the principle of least privilege and concerns surrounding confidentiality, integrity, and availability. Then you will learn about methods for protecting information, including antivirus and antimalware software, firewalls, password security, and safe browsing. Finally, you will discover the importance of patching and updates, best practices for device security, and removing unwanted software. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
17 videos | 1h 43m has Assessment available Badge
CompTIA IT Fundamentals: Privacy & Encryption
In an information age, privacy and security are of paramount importance. We've seen numerous examples of the damage done when information is compromised. With this in mind, organizations spend vast resources to keep information safe and secure for good reason. In this course, you will learn about privacy and encryption, beginning with the basics of Internet and computing privacy. Then you'll explore software and network privacy considerations, security policies and procedures, regulations and considerations for handling information, and password best practices. Finally, you'll delve into encryption technologies and the importance of protecting data at rest and data in transit. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
15 videos | 1h 28m has Assessment available Badge
CompTIA A+ Core 1: Cloud Computing Concepts
Cloud computing allows users to store and access data and programs over the internet instead of a local hard drive. In this course, explore cloud computing concepts such as cloud model types, resource sharing, measure service, and virtual desktops. Discover the features of Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS); and learn how to differentiate between public, private, hybrid, and community cloud infrastructures. Discover key differences between internal and external shared resources and explore rapid elasticity, a feature that allows for scalable provisioning. Finally, examine the considerations and benefits of using a measured service or a metered service and investigate the types of virtual desktops and their purposes. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification.
11 videos | 1h 17m has Assessment available Badge
CompTIA A+ Core 1: Wireless Networking & Services
Wireless networks are much more versatile than wired networks, especially in an environment where running wires might be difficult. This course covers the most efficient wireless networking protocols for various scenarios. You will explore wireless frequencies and channels and learn how to differentiate between 802.11 standards: - a, - b, - g, - n, - ac, and - ax. Next, delve into considerations for working with long-range fixed wireless, including licensed, unlicensed, power, and regulatory requirements. You will also identify features of near-field communication (NFC) and radio-frequency identification (RFID). Finally, explore server roles such as domain name system (DNS) and dynamic host configuration protocol (DHCP), and discover the global market for Internet of things (IoT) end-user solutions. After completing this course, you'll be able to differentiate between wireless networking protocols and tune common host services. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification exam.
16 videos | 2h 25m has Assessment available Badge
CompTIA A+ Core 1: Networking Fundamentals
In order for computers to be able to exchange data and share resources with each other, they must be interconnected in some fashion. This is referred to as computer networking. Explore computer networking fundamentals, including TCP and user datagram protocol (UDP) ports, and review common networking hardware devices. Examine the differences between hubs and bridges. Discover when to use a network switch and how a router can protect a system. Explore key differences between access points, repeaters, and extenders, as well as cable and DSL modems. Learn about the benefits of Power over Ethernet (PoE) and compare it with Ethernet over Power, which uses common electrical wiring to convey Ethernet connectivity. Lastly, take a look at the features of network interface cards (NIC), optical network terminal (ONT), and software-defined networking (SDN) technologies. This course will prepare you for the CompTIA A+ Core 1 (220-1101) certification exam.
14 videos | 1h 31m has Assessment available Badge
CompTIA A+ Core 1: Networking Concepts & Configurations
Internet Protocol (IP) addresses, which are assigned to network-equipped devices that are part of a Transmission Control Protocol (TCP)/IP-based network, allow computers and other resources to communicate with each other. Explore the basics of IP addressing and networking concepts such as Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP). Begin with an overview of DNS and its benefits. Then take a closer look at the DHCP, its features, and the concept of reservations. Next, discover the use of virtual private networks (VPNs) and look at virtual local area networks (VLANs). Finally, explore the various networking tools including crimpers, Wi-Fi analyzers, and loopback plugs. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification exam.
14 videos | 1h 57m has Assessment available Badge
CompTIA A+ Core 1: Client-side Virtualization
Virtualization enables the ability to use software to create a virtual computer system. One of the main benefits of virtualization is that it allows organizations to run multiple virtual systems using a single computer system, such as a server. Explore the basics of virtualization, including how it allows for the creation of virtual resources like operating systems, servers, and storage solutions. Begin with an overview of virtual machines (VMs) and memory and discover the purpose of VMs and the tasks they perform, their common uses and how they are created within the physical host computer, as well as common configurable settings for a VM. Finally, you will examine the resource and security requirements for virtualization. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification.
6 videos | 32m has Assessment available Badge
CompTIA A+ Core 2: Desktop, Server, & Mobile Operating Systems
Technicians must be aware of the features and installation requirements of various types of operating systems. Use this course to learn about common OS types and how to perform OS installations and upgrades in a diverse OS environment. Begin by exploring the features of Windows, Linux, macOS, ChromeOS, and mobile device operating systems. Discover available OS installation options and plan an operating system deployment strategy after reviewing various installation methods. Finally, perform the installation of a Windows 10, Windows Server 2019, Ubuntu Linux, and macOS system. Once you have completed this course, you will be able to select the appropriate operating system for a given scenario and plan its deployment. This course will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
14 videos | 1h 18m has Assessment available Badge
CompTIA A+ Core 2: Linux, macOS, & Windows File Systems
New disk devices can be initialized as Master Boot Record (MBR) or GUID Partition Table (GPT) and can be formatted using different types of file systems. Use this course to become familiar with and learn how to manage common Linux, macOS, and Windows file systems. To start, explore common file system types including the New Technology File System (NTFS), File Allocation Table (FAT32), exFAT, ext3, ext4, and the Apple File System (APFS). Discover the difference between MBR and GPT disks and learn how to format and partition disks. You'll then work with NTFS, share, and Linux file system permissions to configure access for network shares and learn how to manage file systems using command line tools. Once you have completed this course, you will be able to choose the appropriate file system and management tools for specific situations. This course will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
12 videos | 1h 7m has Assessment available Badge
CompTIA A+ Core 2: Operating System & Network Management
Understanding the network connectivity options in modern operating systems is a vital skill you need as a technician. In this course, you will explore various GUI management tools that can be used when working in Windows. Learn to navigate and configure Control Panel settings and discover how to utilize networking commands in Windows and Linux, and management tools for macOS. Next, you will review how IP addressing, DNS, and DHCP works and observe how to configure Windows DNS and DHCP servers. Finally, learn how to manage various network settings, including those related to Windows Defender and Microsoft Active Directory. Upon completion of this course, you'll be able to use command-line management tools and manage network-related settings in Windows, Linux, and the macOS. This course will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
16 videos | 1h 50m has Assessment available Badge
CompTIA A+ Core 2: Information Management & Change Management Processes
Ticketing systems are a great way to collect user and device information, descriptions of problems, and problem resolutions. This course will explore ticketing and asset management systems and how these systems capture information about events and resources. Explore document types such as acceptable use policies, compliance, and network topology diagrams. Discover components of a typical standard operating procedure, including procedures for custom installation of software packages. Next, consider the importance of knowledge base articles and explore best practices for documenting business processes, including rollback plans, sandbox testing, and responsible staff members. Lastly, explore considerations when explaining basic change management best practices. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
11 videos | 55m has Assessment available Badge
CompTIA A+ Core 2: Operating System Security Best Practices
There are many things to consider when managing and configuring basic security settings in the Microsoft Windows OS. Therefore, technicians must become well versed in configuring and enforcing workstations to meet best practices for security. In this course, you will begin by learning how to configure basic security settings including firewalls, Defender anti-virus, users and groups, and operating system login options. Explore the difference between NTFS and share permissions and discuss file and folder attributes and inheritance. Next, discover features of the administrator and standard user accounts and learn the fundamentals of user account control (UAC). Lastly, explore how to configure workstation security using features such as encryption, complex passwords, and account management and how to disable the AutoRun and AutoPlay features. Upon completion, you'll know how to configure basic security setting in the Windows OS. This course is part of a series used to prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
16 videos | 1h 34m has Assessment available Badge
CompTIA A+ Core 2: Safety Procedures & Environmental Impacts
Environments should be designed and maintained with personal safety best practices and safety standards in mind. Enforcing safety standards helps ensure that operators are kept safe and prevented from causing harm to their systems. In this course, you'll learn when and where to use electrostatic discharge straps, mats, and bags. Explore personal safety measures, including disconnecting power before repairing a PC, lifting techniques, electrical fire safety, safety goggles, and air filtration masks. Discover material safety data sheet (MSDS) handling and disposal recommendations, including proper battery disposal, proper toner disposal, and proper disposal of other devices and assets. You will also learn the importance of temperature, humidity-level awareness, and proper ventilation, including equipment placement, dust cleanup, and compressed air and vacuums. Lastly, explore the impact of power surges, under-voltage events, and power outages and discuss when to use battery backup and surge suppressors. This course helps prepare for CompTIA A+ certification exam 220-1102.
12 videos | 57m has Assessment available Badge
Security Programming: Command Line Essentials
This 14-video course explores how to navigate a Linux command-line environment by showing learners how to use its most common tools, including text editing and processing, file monitoring and comparison, and package management. You will examine the common properties of the command line environment, including the bash shell, its properties, and the features of the PowerShell environment. This course next demonstrates how to perform text editing using commands such as nano; how to use the Linux EI library, Linux ED text editor; and text processing using commands such as sed awk, and cut. You will learn how to perform repeat actions, and the bash shell history, and perform process control tasks such as PS and kill. Then learn how to use the command line to schedule jobs, perform file and command monitoring, and perform file comparison using the diff command. Finally, this course demonstrates how to redirect the inputs and outputs of commands and files, and perform package management tasks by using the apt command.
14 videos | 56m has Assessment available Badge
Security Programming: System Essentials
In this 14-video course, learners will explore how Linux-based systems operate, communicate, and manage the underlying information they contain. Begin by examining management and monitoring tools available in Unix and Linux environments. Then learn to work with user accounts and domain names, and learn how to monitor user and system activity. You will learn how to securely connect to remote servers by using secure shell (SSH), and how to work with user accounts. This course examines elements of both an Internet Protocol routing table and a network interface, and demonstrates how to perform Domain Name System lookups. Learners will examine log files for monitoring critical events on a Linux system and use the PS command to retrieve process information. You will learn how to retrieve disk usage, partition information, and directory contents of a Linux system, and how to monitor both user and system activity on a Linux system. Finally, this course demonstrates how to configure time and date services and explore system configurations in the /etc folder of a Unix system.
14 videos | 56m has Assessment available Badge
CyberOps Windows Hardening: Windows Server Hardening Best Practices
Windows servers are the heart of many corporate networks and may contain sensitive company data that, if leaked or stolen by an attacker, would be catastrophic. Protecting the Windows Server assets and preventing a security compromise is an important skill for IT security professionals to master. In this course, you'll learn how to help prevent security incidents by hardening the Windows Server and reducing the attack surface. You'll learn how to follow common security best practices to lock down a Windows system by hardening user accounts, passwords, services, the file system, and common network services, such as DNS and IIS.
16 videos | 1h 32m has Assessment available Badge
Programming Fundamentals : Command Line Interface & Operating System Commands
In computer programming, commands are a common method of interacting with a computer to perform specific operations. A computer's command line interface (CLI) tool is used to enter, accept, and forward commands to the computer's operating system (OS). The commands and CLI will vary depending on the OS used (Microsoft, Linux, macOS, etc.) Use this course to get started with some of the most common commands used in Windows and Linux systems. Learn the commands that generate the most return in terms of productivity, such as engaging with files, folders, and programs. In doing this, become comfortable with using Windows and Linux CLIs. By the end of the course, you'll be able to execute the most frequently used commands on a Windows or Linux system.
12 videos | 1h 1m has Assessment available Badge
Maintenance & Troubleshooting
Maintaining your network helps ensure high performance and availability. Learn how to troubleshoot specific problems, perform maintenance tasks at system startup and shutdown, and manage Junos OS versions.
11 videos | 51m available Badge
Commands
To help keep your network running smooth, Junos OS provides plenty of monitoring functionality. Explore the basic command line tools available in Junos OS for getting the status of devices and networks.
11 videos | 51m available Badge
Architecture & Enterprise Governance
COBIT 5 is used to maximize confidence in, and value of, information systems. Explore COBIT and its evolution over time to its most recent version, COBIT 5, as a framework for IT enterprise governance and management.
11 videos | 37m has Assessment available Badge
Command Line Utilities
Discover some of the important tools and software available in Ubuntu and explore important command line utilities.
13 videos | 1h 15m has Assessment available Badge
The Unix Command Line & GUI
Explore the Unix operating system command line and GUI. In this course, you will learn how to manage your Unix system through the command line; to execute common command line tasks, with standard syntax. Discover a variety of Unix shells, that are used to combine the tools to perform complex work flows. Learn how to switch between shells and the man-page viewer. Study Unix configuration file standards and log files. Edit files with the nano text editor. Explore and configure the X Window System and the Unix interface.
10 videos | 47m has Assessment available Badge
Managing Enterprise InfoSec Risks & Risk Tolerance
IT security risks can be defined as a combination of the consequences of an event and the associated likelihood of occurrence. They can be managed by an organization through asset-safeguarding strategies. Through this course, learn about managing enterprise information security (InfoSec) risk and risk tolerance. Explore the definition of risk, how it differs from threats and vulnerabilities, and the history of information security. Next, discover common threats to IT systems and data, how to identify and manage security risks, and the key differences between quantitative and qualitative risk analysis. Finally, learn about common risk assessment tools and the differences between penetration testing and vulnerability assessments. Upon completion, you'll be able to outline and manage IT security risks.
15 videos | 1h 44m has Assessment available Badge
Information Security Practices: Multi-year InfoSec Planning
There is no easy way to predict the future of information security. There are however strategies leaders can implement to better plan and prepare for future growth, security, and threats. In this course, examine potential information security threats, how complexity makes them challenging to predict and plan for, and the threats that ransomware, cybercrime, and the growing crime-as-a-service (CaaS) community pose. Next, discover how work shortages and voids created by skills gaps can cause major issues and the impact of recent global pandemics. Finally, explore operational technology, application container risks, and the evolving risks posed by artificial intelligence and machine learning. Upon completion, you'll be able to plan for the future as an InfoSec leader.
15 videos | 1h 17m has Assessment available Badge
Information Security: Hardened Security Topologies
In this 8-video course, learners will discover the key concepts of different security topologies and the key role they play in network security. Begin with an introduction to security topologies, which define the network design based on security requirements. You will then explore the design goals for security topology, the elements used to ensure that the information is secure, which means that you need the concepts of confidentiality, integrity, and availability (CIA), of information in a proper way, and it needs to be secured. You also need to practice accountability along with CIA concepts. Next, you will examine advantages and disadvantages of different security topologies, which are the Intranet, the Internet, and various other topologies. You will take a look at the impact of integrating cloud topologies, and also delve into the various layers of security in cloud computing. The final tutorial in this course explores the different methods used to harden the components of security topologies.
8 videos | 42m has Assessment available Badge
Systems Engineering: An Introduction
Systems engineering is a holistic approach to engineering that considers the system, including its components, interactions, and environment. It aims to ensure that the system meets the needs and expectations of its stakeholders while satisfying technical, performance, and safety requirements. In this course, you will be introduced to systems engineering, beginning with a discussion of its systems engineering principles, the systems engineering life cycle, the systems engineering process, the V-model, the iterative process model, and lean engineering. Then you will learn about process integration, systems engineering and complex systems, and how systems engineering compares to similar disciplines. Finally, you will explore system types and engineering product development.
17 videos | 1h 37m has Assessment available Badge
Systems Engineering: Principles & Design Process
Systems engineering aims to ensure that the system meets the needs and expectations of its stakeholders while satisfying technical, performance, and safety requirements. To accomplish that feat, it's important to understand systems engineering principles, planning, and process design. In this course, you'll learn about engineering systems, beginning with the importance of engineering, the systems engineer role, engineered system context, and the impact of systems engineering on project management. Then you'll dig into the benefits of systems engineering, how systems engineers solve complex problems, and systems engineering plans and planning. Finally, you'll explore the engineering design process, its key principles and advantages, solving engineering design process problems, and how to create an engineering design process project.
17 videos | 1h 36m has Assessment available Badge
Systems Engineering: System Architecture & Design
Systems engineering involves a structured and iterative process of defining, analyzing, designing, validating, and verifying the system. System architecture and design are key elements of that process and require a significant amount of understanding in order to complement how everything works together in the system engineering process. In this course, you will explore system architecture and design, beginning with system architecture and components, system requirements, and modeling and simulation. Then you will learn about considerations for system requirements, system modularity, and standardization. Next, you will examine stakeholders and stakeholder needs and requirements. Finally, you will explore the principles of system design, investigate metrics for evaluating system designs, and find out how to evaluate a system.
18 videos | 1h 38m has Assessment available Badge
Systems Engineering: Systems Thinking
Systems Engineering requires effective communication and collaboration among various stakeholders, including customers, users, designers, developers, testers, and managers. Systems thinking is a way of understanding complexity and looking at systems in their entirety. In this course, you will begin with an introduction to systems thinking, its philosophy, and principles. Then you'll learn about the advantages of systems thinking, key systems thinking concepts, and common systems thinking tools. Finally, you'll look at systems thinking as it relates to systems engineering and how systems thinking can be applied to real-world problems.
9 videos | 44m has Assessment available Badge
Certified in Cybersecurity (CC): Core Security Principles & Risk Management
It is of high importance that organizations operate upon a solid foundation of security principles, concepts, and risk management. It is impossible to reduce security risk until core security and risk management principles are defined. In this course, explore the elements of the confidentiality, integrity, and availability (CIA) triad, along with the essentials of authentication and using non-repudiation services. Next, examine what risk is and the terminology surrounding risk management, threats, and vulnerability. Finally, learn about risk assessment, identification, and treatment and compare qualitative and quantitative risk analysis. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
11 videos | 32m has Assessment available Badge
Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
Security governance is a huge part of overall corporate or organizational governance. The security practitioner must be aware of various governance elements, regulations, laws, standards, policies, and procedures. Begin this course by exploring the elements of governance, including mission charter, leadership, and corporate guidance. Then investigate various laws and regulations like General Data Protection Regulation (GDPR) and HIPAA, standards issued by the International Organization for Standardization and International Electrotechnical Commission (ISO/IEC), and the National Institute of Standards and Technology (NIST), and common policies and standard operating procedures. Next, examine the International Information System Security Certification Consortium (ISC2) code of ethics. Finally, discover security control categories and types. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos | 25m has Assessment available Badge
Certified in Cybersecurity (CC): Business Continuity Planning
Many organizations nowadays have become aware of the need for business continuity planning, also known as continuity of operations. The main objective of a business continuity plan (BCP) is for an organization to maintain organizational operations while recovering from a major interruption. In this course, explore the importance and goals of business continuity and continuity of operations, as well as the components of a business continuity plan. Next, learn about business impact analysis (BIA), backup and restore policies, and disaster recovery plans. Finally, investigate the various tests and drills that incident response and business continuity plans should be subjected to. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos | 30m has Assessment available Badge
Certified in Cybersecurity (CC): Networking & Security Infrastructure
Although new security practitioners can come from development, database, or other backgrounds, the majority of security professionals come from a networking background. It is virtually impossible to separate networking knowledge from security expertise. Begin this course by exploring network types, network devices, and device addressing mechanisms. Then you will discover the Open Systems Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) reference models, logical ports, and the TCP handshake. Next, you will focus on transport layer security (TLS) and IP security (IPsec). Finally, you will examine virtual LANs (VLANs) and Wi-Fi fundamentals. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
12 videos | 45m has Assessment available Badge
Certified in Cybersecurity (CC): Data Security & System Hardening
For many organizations, data is the most critical asset to be secured. Begin this course by exploring the data life cycle, or the different phases a piece of data goes through, from data creation to data destruction. You will focus on each of the six phases, including create, store, use, share, archive, and destroy. Then, you will learn how to log and monitor security events using modern enterprise and cloud-based solutions. Next, you will investigate encryption, hashing, and digital signing. Finally, you will discover system hardening practices like patch management. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
11 videos | 29m has Assessment available Badge
Cloud Security Fundamentals: Basics of Cloud Operations
Learners can build a foundation for upcoming cloud security topics by exploring cloud definitions, roles, deployment models, characteristics, and building block technologies in this 9-video course. In the first tutorial, you will learn what cloud computing is, its definitions, and roles. You will then examine the characteristics of key cloud computing models, including Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (Paas). Learners next take a look at the building blocks of what makes cloud computing tick, which is virtualization technology. Following on from this, you will explore compute building block technologies; storage building block technologies, and networking building block technologies. You will also need to be aware of the different database building block technologies offered by your cloud provider. In the final tutorial in this course, learners will compare common public cloud solution provider (CSP) product offerings. In the concluding exercise, you will need to list four advantages of cloud computing, four common software as a service solutions, and four database building block technologies.
10 videos | 54m has Assessment available Badge
Cloud Security Administration: Hardened Cloud Security
An important concept in cloud security is system and OS hardening, which can aid in reducing software vulnerability and provide data confidentiality and privacy. Hardening protects against exploitation of weaknesses in software, which could be applications, operating systems, or firmware. Vulnerability assessments and using penetration testing to discover issues in code or software can be used to protect the software. In this course, you'll learn about hardening, why it's important to decrease or eliminate security vulnerabilities, and best practices for software and hardware protection.
10 videos | 45m has Assessment available Badge

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE TRACKS

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)