Aspire Journeys
451 System Administrator Intermediate KSAT journey
- 52 Courses | 55h 46m 13s
Responsible for setting up and maintaining a system or specific components of a system (e.g. for example, installing, configuring, and updating hardware and software; establishing and managing user accounts; overseeing or conducting backup and recovery tasks; implementing operational and technical security controls; and adhering to organizational security policies and procedures).
451 System Administrator Intermediate
Responsible for setting up and maintaining a system or specific components of a system (e.g. for example, installing, configuring, and updating hardware and software; establishing and managing user accounts; overseeing or conducting backup and recovery tasks; implementing operational and technical security controls; and adhering to organizational security policies and procedures).
- 52 Courses | 55h 46m 13s
COURSES INCLUDED
Microsoft Azure Security Technologies: VPNs
In this course, used in preparation for the AZ-500 Microsoft Azure Security Technologies certification exam, you will discover how VPNs provide an encrypted tunnel over the Internet from clients or on-premises networks to the Azure cloud. Explore how to configure a point-to-site or site-to-site VPN and how to connect a Windows 10 device to an Azure VPN. You will begin the 7-video course by receiving an overview of how VPNs allow secure connections to Azure. Next, you will explore how to use PowerShell to generate public key infrastructure (PKI) certificates. To take advantage of Azure VPN connectivity, you need to establish a virtual network gateway in the Azure cloud, which is a configuration that represents a VPN appliance in the Azure cloud. You will do this in order to configure both a point-to-site and site-to-site VPN. In the final tutorial, learners will discover how to connect a Windows 10 device to an Azure VPN.
7 videos |
26m
Assessment
Badge
CompTIA Cloud+: Cloud Architecture & Models
The cloud has various deployment and service models that can help your organization design and create your very own cloud strategy based on needs. First, you'll learn about the available cloud deployment models such as public, private, hybrid, community, and virtual public clouds, as well as multi-cloud and multitenancy environments. Next, you'll examine cloud service models such as Infrastructure as a Service, Platform as a Service, and Software as a Service. Finally, you'll learn about advanced topics such as the Internet of Things, serverless computing, machine learning, artificial intelligence, and the shared responsibility model. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos |
1h 10m
Assessment
Badge
CompTIA Cloud+: Cloud Identity & Access Management
Identity and access management is crucial to securing resources and ensuring the resources are used by the correct people. In this course, you'll learn about some of the security resources that are available for performing and enforcing identity and access management. First, you'll examine identity and access management, including user identification, authorization, and privileged access management. You'll learn how to use the Lightweight Directory Access Protocol to manage access to resources. Next, you'll explore how identity federation can be used to manage user identities and how certificate management can be performed using certificate authorities, registration authorities, certificate databases, certificate stores, and key archival servers. You'll then move on to learn about multi-factor authentication, single sign-on, Public Key Infrastructure, as well as secret and key management. Finally, you'll learn about the components that can be used to perform incident response preparation and incident response procedures such as evidence acquisition, chain of custody, and root cause analysis. This course is one of a collection of courses that prepares learners for the CompTIA Cloud+ (CV0-003) certification.
12 videos |
1h 13m
Assessment
Badge
Google Professional Cloud Architect: Designing for Google Cloud Compliance
Compliance is a significant concern for many organizations, and many have historically failed to protect data adequately. In this course you will explore how governance has come to protect data, such as health records, through legislation like HIPAA and COPPA. Then, discover how commercial interests have helped bolster financial stability by setting standards of protecting data via certifications like Personally Identifiable Information (PII) and Payment Card Industry Data Security Standard (PCI DSS) that allow customers and businesses to trust you. In addition, there are specific industry certifications that may need to be met depending on the function of the business you run, rather than the data you keep. You will also focus on the need to maintain careful auditing standards for the integrity of any legal disputes that might arise. Finally, you will focus on use cases that you can expect to encounter in an exam environment. This course is one of a collection that prepares learners for the Google Professional Cloud Architect exam.
12 videos |
59m
Assessment
Badge
CompTIA A+ Core 1: Wireless Networking & Services
Wireless networks are much more versatile than wired networks, especially in an environment where running wires might be difficult. This course covers the most efficient wireless networking protocols for various scenarios. You will explore wireless frequencies and channels and learn how to differentiate between 802.11 standards: - a, - b, - g, - n, - ac, and - ax. Next, delve into considerations for working with long-range fixed wireless, including licensed, unlicensed, power, and regulatory requirements. You will also identify features of near-field communication (NFC) and radio-frequency identification (RFID). Finally, explore server roles such as domain name system (DNS) and dynamic host configuration protocol (DHCP), and discover the global market for Internet of things (IoT) end-user solutions. After completing this course, you'll be able to differentiate between wireless networking protocols and tune common host services. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification exam.
16 videos |
2h 25m
Assessment
Badge
CompTIA Network+: The OSI Reference Model
The Open Systems Interconnection (OSI) model is used to describe how computer systems communicate with each other. The OSI model is split into seven abstract layers and is often used for troubleshooting network problems. In this course, learn about the purpose and features of the OSI model. Next, examine each OSI model layer, including the application, presentation, session, transport, network, data link, and physical layers. Finally, discover how human-readable information, such as emails and chat messages, are transferred over a network, as well as the path this information takes along the OSI model. This course is one of a collection that helps prepare learners for the CompTIA Network+ (N10-009) certification exam.
10 videos |
51m
Assessment
Badge
CompTIA Network+: Networking Appliances, Applications, & Functions
Networking devices are hardware components used to facilitate communication and interaction between devices on a computer network. In this course, you'll learn about various networking devices to determine when and where to use them on a network. Explore common devices such as switches and routers, in addition to network appliances used for more specialized tasks such as the intrusion prevention system (IPS), intrusion detection system (IDS), proxy servers, and network-attached and storage area networks. Lastly, discover common networking functions including quality of service (QoS), virtual private network (VPN), and time to live (TTL). This course is one of a collection that helps prepare learners for the CompTIA Network+ (N10-009) certification exam.
11 videos |
59m
Assessment
Badge
CompTIA Network+: Cloud Computing Concepts
Cloud computing refers to the delivery of computing services, including servers, storage, databases, networking, software, and more over the Internet. This allows individuals and organizations to access and use these resources on demand, without needing to own or manage physical infrastructure. In this course, explore key cloud concepts and connectivity options, including network functions virtualization (NFV), virtual private cloud (VPC), network security groups, network security lists, and cloud gateways. Next, examine cloud connectivity options such as VPN and direct connection, and deployment and service models. Finally, learn about cloud scalability, elasticity, and multitenancy. This course is one of a collection that helps prepare learners for the CompTIA Network+ (N10-009) certification exam.
16 videos |
1h 26m
Assessment
Badge
CompTIA Network+: Network Topologies, Architectures, & Types
Network architectures refer to the overall design and layout of a network, including how devices and components are organized and interconnected. In this course, explore wireless and wired networking standards, the features of key satellite and cellular technologies, and the differences between various types of wired transmission media. Next, compare Ethernet and fibre channel (FC) transceiver protocols and the differences between common network connector types. Finally, learn about common network topologies, architectures, and types, as well as use cases for a collapsed core architecture and network traffic flow. This course is one of a collection that helps prepare learners for the CompTIA Network+ (N10-009) certification exam.
15 videos |
1h 14m
Assessment
Badge
CompTIA Network+: Wireless Configurations & Physical Installations
Setting up and managing Wi-Fi routers, access points, and devices like smartphones, tablets, and laptops typically involves the configuration of wireless devices and technologies. This course equips you to recognize important factors of physical installations and to select and configure wireless devices and technologies. First, you'll explore the purpose and key features of Wi-Fi channels and recognize their respective regulatory impacts. Then, you'll learn when to implement 2.4 GHz, 5 GHz, 6GHz wireless frequencies and when to deploy service set identifiers (SSIDs) or extended service set identifiers (ESSIDs). Next, you'll discover different wireless network types including ad hoc, point-to-point, and infrastructure. Finally, you'll explore how to select and configure wireless devices and technologies for different scenarios. This course is one of a collection that helps prepare learners for the CompTIA Network+ (N10-009) certification exam.
14 videos |
1h 14m
Assessment
Badge
CompTIA Network+: Troubleshooting Methodologies & Approaches
If an incident or outage occurs, network administrators must be able to respond effectively and resolve network problems promptly to avoid damages and costly repairs. A network troubleshooting methodology can provide guidance on using a systematic process of elimination when dealing with network issues. In this course, learn the best practices to use to identify a problem, establish a theory of probable cause, and test theories. Next, discover how to formulate a plan of action to resolve the problem, implement a solution, or escalate the issue. Finally, explore how to verify full system functionality and document findings, actions, outcomes, and lessons learned. This course is one of a collection that helps prepare learners for the CompTIA Network+ (N10-009) certification exam.
37m
Assessment
Badge
CompTIA Cybersecurity Analyst+: Network Security Concepts
Cybersecurity policies often require detailed network configuration changes and additions. Technicians must be proficient with the configuration and management of various TCP/IP protocols. In this course, I will start by discussing the Open Systems Interconnection (OSI) model, network switching, and network access control. Next, I'll discuss the TCP/IP protocol suite as well as IPv4 and IPv6 addressing. I will then discuss network routing, dynamic host configuration protocol (DHCP), domain name system (DNS) and Wi-Fi authentication methods. Lastly, I will cover virtual private networks (VPNs), IP Security (IPsec) and network time synchronization. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.
14 videos |
1h 29m
Assessment
Badge
CompTIA Cybersecurity Analyst+: Cloud Computing & Cybersecurity
Cloud computing is an integral part of IT solutions for individuals and organizations. A knowledge of how cloud computing services are deployed and managed is a requirement for securing cloud-based resources. In this course, I will start by discussing cloud computing deployment models, such as public and private clouds, followed by discussing various cloud computing service models. Next, I will cover a variety of cloud computing security solutions, and I will deploy Linux and Windows cloud-based virtual machines. I will then deploy a web application in the cloud, cover the Cloud Controls Matrix (CCM) security controls, and work with Microsoft Azure managed identities. Lastly, I will discuss and configure a content delivery network (CDN). This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.
12 videos |
1h 10m
Assessment
Badge
CompTIA Cybersecurity Analyst+: Virtualization & Container Security
Virtualization comes in a variety of forms, including operating system, application, and desktop virtualization. Cybersecurity analysts regularly manage and secure application containers and virtual machines on-premises and in the cloud. In this course, I will discuss the differences between operating systems, application, and desktop virtualization. I will then configure Microsoft Hyper-V. Next, I will cover application containerization concepts, install Docker on Linux, and manage application containers on Linux. Lastly, I will install Docker on Windows and manage application containers on Windows. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.
7 videos |
36m
Assessment
Badge
CompTIA Cybersecurity Analyst+: Data Security Standards
To remain compliant with relevant data privacy laws and regulations, organizations must have a way of identifying sensitive data and implementing security controls to protect that data. In this course, explore how physical security is related to digital data security, examples of personally identifiable information (PII), and how data loss prevention (DLP) solutions can prevent data exfiltration. Next, learn about common data privacy regulations and standards, including GDPR, HIPAA, and PCI DSS. Finally, discover how to use Amazon Macie and File Server Resource Manager to discover and classify sensitive information and learn about the importance of service level objectives (SLOs) and service level agreements (SLAs). This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.
11 videos |
1h 3m
Assessment
Badge
CompTIA Cybersecurity Analyst+: Public Key Infrastructure
Public key infrastructure (PKI) certificates are used to secure IT environments in many different ways, such as through e-mail encryption and web server HTTPS bindings. Technicians must have an understanding of how PKI certificates are requested, issued, and used. In this course, I'll start by discussing the PKI hierarchy from certification authorities (CAs) down to issued certificates and explore the PKI certificate life cycle. Next, I will deploy a private CA on the Windows platform and demonstrate how to manage PKI certificate templates. Then, I will acquire PKI certificates and configure a web server HTTPS binding. Lastly, I will configure a website to allow access only from clients with trusted PKI certificates. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.
9 videos |
49m
Assessment
Badge
CompTIA Cybersecurity Analyst+: Hardening Techniques
Hardening refers to attack surface reduction in IT environments and can be applied to any type of device or software environment, including storage area networks (SANs). Firmware and software patches should be applied to ensure that potential security flaws in code have been addressed. In this course, I will begin by covering hardening techniques for a variety of IT environments, followed by using Microsoft Group Policy to configure security settings for Active Directory domain-joined computers. Next, I will discuss storage area networks and related security considerations. I will then remove the need for virtual machine (VM) public IP addresses by allowing remote access through Microsoft Azure Bastion. I will discuss the importance of applying hardware and software patches. Lastly, I will install and configure a Windows Server Update Services (WSUS) server and deploy updates to Microsoft Azure virtual machines. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.
10 videos |
56m
Assessment
Badge
CompTIA Cybersecurity Analyst+: Secure Coding & Digital Forensics
Security must be included in all phases of IT system and software development designs. Continuous integration and continuous delivery/deployment (CI/CD) integrates development and ongoing management of IT solutions. Cybersecurity analysts must understand IT governance and digital forensics concepts. Begin this course by examining the role of security in the software development life cycle (SDLC). Then you will explore CI/CD and learn how Git is used for file version control. Next, you will discover how the Control Objectives for Information and Related Technologies (COBIT) framework applies to IT governance and you will investigate digital forensics. Finally, you will configure legal hold settings for a cloud storage account and list common digital forensics hardware and software solutions. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.
10 videos |
55m
Assessment
Badge
CompTIA Server+: Deploying Cloud PaaS & SaaS
Platform as a Service (PaaS) and Software as a Service (SaaS) are two popular and valuable cloud service models. Both play a unique role in managing certain aspects of cloud computing. If you're an IT professional working in server environments, you need to know what these two cloud service models entail. Take this course to learn all about PaaS and SaaS solutions. Furthermore, practice deploying databases in the AWS and Microsoft Azure clouds. Configure a SaaS cloud solution. Use an automation template to deploy a PaaS solution. And use several strategies and tools to keep cloud computing costs to a minimum. Upon course completion, you'll be able to deploy PaaS and SaaS solutions and control cloud computing costs. This course also helps prepare you for the CompTIA Server+ SK0-005 certification exam.
9 videos |
46m
Assessment
Badge
CompTIA Server+: File System Security
Today's IT security ecosystem requires strong file system security. This is achieved not only through a robust file system permissions implementation but also controlled network access. Learn how to handle file system security in this mostly hands-on course. First, get a theoretical overview of how file system security works in Windows and Linux environments. Then, practice configuring permissions for network shared folders and setting NTFS file and folder permissions. Next, use the Windows built-in Encrypting File System (EFS) option to encrypt files and folders. Enable disk volume encryption using Microsoft BitLocker. Encrypt files using OpenSSL. Configure Linux file system permissions. And work with file hashing in Windows and Linux. Upon course completion, you'll be able to implement and manage Windows and Linux file system permissions, encryption, and file system hashes. You'll also be more prepared for the CompTIA Server+ SK0-005 certification exam.
13 videos |
1h 18m
Assessment
Badge
CompTIA Server+: Network Communications
Learning the various aspects of network communications hardware and software is vital to anyone working in a server environment. Use this theory and practice-based course to get a grip on configuring virtual networks and virtual network interface cards (NICs). Explore how network communications hardware and software map to the OSI model. Identify different types of communication networks such as LAN and VLAN. Then, learn how network switching and network routing work. Moving on, practice deploying a hypervisor virtual network. Next, practice configuring IP routing in the cloud and virtual network peering. Then, identify various types of NICs and cables. And finally, practice configuring on-premises and cloud-based virtual machine NICs. Upon completion, you'll be able to identify various network models and configure virtual networks and virtual NICs. You'll also be a step closer to being prepared for the CompTIA Server+ SK0-005 certification exam.
12 videos |
1h 12m
Assessment
Badge
CompTIA Server+: Working with TCP/IP
TCP/IP has become the standard software-based network protocol suite used globally. Those working in a server environment need to have a robust understanding of the protocols and services of TCP/IP and their configuration. Learn all about these configurations in this course. Explore IPv4 addressing and IP subnetting and practice configuring IPv4 manually. Next, learn about DHCP and deploying a Windows DHCP server. Then, examine how TCP and UDP transport protocols differ. Moving on, practice configuring IPv6 addresses manually and also configuring IP addresses in the cloud. Explore DNS and practice the deployment of a Windows DNS server and the configuration of DNS zones in the cloud. And finally, explore NTP and its configurations. When you're done, you'll be well versed in the configurations of the different TCP/IP services. You'll also be further prepared to sit the CompTIA Server+ SK0-005 certification exam.
16 videos |
1h 38m
Assessment
Badge
CompTIA Server+: Public Key Infrastructure (PKI)
A public key infrastructure (PKI) is a hierarchy of digital security certificates. The top of the hierarchy consists of a certification authority (CA) and optional subordinate registration authorities (RAs). CAs and RAs issue PKI certificates to users, devices, and apps. Examine the PKI hierarchy and key PKI components including the certification authority, digital certificates, and chain of trust. Learn how to configure a private CA on-premises and in the cloud as a managed service. Explore the details contained within a PKI certificate and configure certificate templates which serve as a blueprint for issuing various types of PKI certificates. Next, you'll learn how to acquire certificates on-premises and in the cloud followed by a look at working with OpenSSL. Upon completion, you'll be able to plan, implement, and manage PKI environments both on-premises and in the cloud. You'll also be a step closer to being prepared for the CompTIA Server+ SK0-005 certification exam.
10 videos |
59m
Assessment
Badge
CompTIA Server+: Data Privacy & Protection
Data privacy has become engrained in laws and regulations all over the world. Server technicians must take the appropriate steps to secure sensitive data in alignment with applicable laws and regulations. Discover items that constitute personally identifiable information (PII) and protected health information (PHI) and identify common data security standards such as GDPR, HIPPAA, and PCI DSS. Differentiate between various types of malware and discover how the art of deception is practiced through social engineering. Next, examine data loss prevention (DLP) and implement data discovery and classification on-premises and in the cloud. Lastly, examine key storage media destruction techniques. Upon course completion, you'll be able secure data in alignment with applicable laws and regulations. You'll also be more prepared for the CompTIA Server+ SK0-005 certification exam.
11 videos |
1h 3m
Assessment
Badge
CompTIA Server+: Server Troubleshooting
The importance of ongoing server management for server technicians cannot be overstated. At the least, it helps them avoid being overwhelmed by troubleshooting hardware problems in a crisis. With this course, gain confidence in server troubleshooting. Explore the steps in the CompTIA troubleshooting process. Then, work with the Windows, Linux, and cloud services logs, followed by implementing centralized Windows and Linux logging hosts. Moving on, examine common hardware and software problems encountered in server environments. Next, work with the common Windows and Linux network troubleshooting commands. And finally, learn how to monitor the performance of Windows and Linux servers. Upon completion, you'll be able to identify the common server hardware and software problems and troubleshoot them. You can also use this course to prepare for the CompTIA Server+ SK0-005 certification exam.
15 videos |
1h 41m
Assessment
Badge
CloudOps Performance Tuning: Applying Performance Principles
When designing solutions, CloudOps practitioners need to mitigate typical performance issues. In this course, you'll explore some common performance problems and the systemic tuning approach to improving performance. You'll examine what comprises a performance engineering approach before outlining a practical performance tuning roadmap. Next, you'll identify post-deployment performance diagnostic techniques for large-scale software systems, essential steps when optimizing application performance, and functional and non-functional components and layers to consider when planning performance management. Moving on, you'll outline the steps involved in configuring performance testing and identify critical cloud computing KPIs and metrics. You'll investigate use cases that help identify gaps in hybrid and multi-cloud deployment architectures. You'll examine performance management challenges and recommended solution architecture for cloud-hosted services. Lastly, you'll outline how to measure private and hybrid cloud performance.
14 videos |
1h 13m
Assessment
Badge
CloudOps Performance Tuning: Tuning Cloud Performance for Deployment
Managing the performance of cloud-hosted services doesn't come without challenges. Luckily, there are tools to help you monitor, measure, and improve performance. You'll start this course by exploring common performance management challenges and solutions. You'll then examine parameters to track IT infrastructure and application performance, differentiate between performance and scalability, and identify key metrics to monitor virtualized environments. Next, you'll look in-depth at the purpose of various tools and services, such as the purpose of the five pillars of the AWS framework, how to improve infrastructure resources on Google Cloud Platform, and the role of IBM Cloud Application Performance Management in increasing cloud efficient. You'll also work with CloudWatch Agent, AWS Compute services, Amazon QuickSight, and Application Insight to increase performance efficiency and visibility and troubleshoot issues. Finally, you'll outline how to ensure applications are more scalable, resilient, and manageable in Azure.
19 videos |
1h 54m
Assessment
Badge
CloudOps Performance Tuning: Managing Multi-cloud Performance
Managing the performance of cloud deployments extends to managing multi, hybrid, and multi/hybrid distributed cloud infrastructures. In this course, you'll explore the challenges, goals, and strategies for performance optimization in these environments. You'll start by identifying desired characteristics for successful and robust hybrid or multi-cloud designs. Next, you'll outline how to create a multi-cloud performance optimization strategy and monitor hybrid and multi-cloud distributed infrastructures. You'll then identify common multi-cloud performance challenges and associated solutions. Furthermore, you'll investigate prominent use cases of multi-cloud networking, recommended solutions to resolve multi-cloud network configuration issues, and the different non-functional tests available to determine a multi-cloud performance benchmark. You'll examine significant business and service continuity performance tuning tasks. Lastly, you'll outline how to tune multi-cloud integrator components to resolve connectivity issues between two participating clouds.
11 videos |
1h 4m
Assessment
Badge
File Management
When administering a Linux system, the command-line interface can be a useful tool. Learn some of the more powerful features of the shell including how to use one command as input into another, and how to create and edit files.
13 videos |
51m
Badge
Network File Systems
As a Linux network administrator, you must be familiar with the available network file systems. Here we show you how to provide and use network file systems on your Linux network.
10 videos |
39m
Badge
Troubleshooting
Network security and maintenance go hand-in-hand. Let's look at some common troubleshooting skills every administrator should know in order to maintain a well working Linux system.
12 videos |
53m
Badge
Performance Tuning
Performance tuning is an important aspect of Oracle Database 12c administration. Learn how to monitor and tune both database and memory performance in Oracle Database 12c.
15 videos |
1h 5m
Badge
Introduction to Performance Tuning
There are many methodologies for troubleshooting performance problems in Oracle Database 12c. Learn about performance management techniques, including tuning goals and objectives, and working with waits, events, classes, and statistics.
15 videos |
29m
Assessment
Badge
Performance Tuning Methodology
Broaden your knowledge of Oracle Database 12c performance tuning by examining a series of commonly occurring real-world performance problems and the typical solutions for those scenarios.
11 videos |
43m
Assessment
Badge
Windows Server 2022: File & Storage Services
Windows Server 2022 can provide central locations on your network where you can store files and share them with other users. In this course, you will investigate common file and storage services available in Windows Server 2022 and discover how to maximize their capabilities. Next, you will differentiate between the New Technology File System (NTFS) and the Resilient File System (ReFS) file systems available in Windows Server 2022, find out how to use file and folder permissions and learn how to create and manage file shares, including Server Message Block (SMB) and Network File System (NFS) shares. Then you will enable and configure encryption and compression features in Windows Server 2022 and examine file and storage services, including offloading and tiering. Finally, you will configure NTFS permissions and create a file share, a Distributed File System (DFS) namespace, and a DFS folder target.
16 videos |
1h 57m
Assessment
Badge
Performance Engineering: Fixing Infrastructure Performance Issues
Infrastructure is the backbone of any network, so related performance issues can adversely affect an organization's ability to provide web services and apps to customers and employees. Infrastructure performance issues can also be costly. For these reasons, performance engineers should be hyper-focused on remediating performance at the source. Use this course to learn how you can fix infrastructure-related performance issues. Begin by understanding the role played by various network infrastructure elements, starting with servers, network backbone, and firewalls. Then, explore internet and browser performance, load balancers, and overall infrastructure monitoring. Next, learn about the server performance advisor tool and workload management performance. Finally, see how Little's Law can be used for better optimization of system queues. When you've completed this course, you'll be able to identify and resolve infrastructure performance problems within your organization.
12 videos |
1h 24m
Assessment
Badge
Performance Engineering: Potential Performance Issues in Software Development
Software system performance has a significant impact on a business. Whether this impact is positive or negative is up to those involved in software development. To ensure well-performing software, you first need to know how to define and measure software performance. Use this course to appreciate the effects of software performance on a business's success. Discover the routine tasks involved in software performance management. Then, delve into the various factors that affect application and database performance. Moving along, examine the metrics used to measure application and database performance. And see what defines scalability and how it differs from performance. When you're done, you'll be versed in the significance of software performance and the management techniques, factors, and metrics involved.
11 videos |
1h 36m
Assessment
Badge
Security Program Regulatory Integration
In this 12-video course, learners will discover the importance of integrating regulations with organizational security policies. Explore security standards such as General Data Protection Regulation (GDPR); Health Insurance Portability and Accountability (HIPAA); and Federal Information Security Management Act (FISMA), as well as the International Organization for Standardization (ISO), and National Institute of Standard and Technology (NIST). To begin, determine how to establish the importance of building regulatory compliance into a company's IT security program. You will then examine Personally Identifiable Information (PII), and Protected Health Information (PHI). This leads into the subject of Payment Card Industry Data Security Standard (PCI DSS), and what it entails. You will learn how HIPAA protects medical information; how GDPR protects European Union citizen data, and how the Gramm-Leach-Bliley Act (GLBA), applies to financial institutions. You will also identify how FISMA strives to protect sensitive US Government information, and recognize both NIST and ISO security standards. To conclude the course, you will discover how the Sarbanes-Oxley Act (SOX), requires organizational financial transparency.
12 videos |
38m
Assessment
Badge
Mitigating Security Risks: Cyber Security Risks
Effective cybersecurity risk management requires intricate knowledge of day-to-day IT security risks, network vulnerabilities, and cyber attacks. In this course, you'll detail several cybersecurity breaches and how best to prevent each one. You'll start with a general overview of what comprises security risks before categorizing different types into information, cloud, and data-related risks. Next, you'll explore cybercrime methods, the motivations behind them, and the security gaps that invite them in. You'll then use real-life examples to detail some commonplace cyberattacks and crimes. Moving on, you'll investigate what's meant by malware and outline best practices to manage worms, viruses, logic bombs, trojans, and rootkits. You'll also learn how to safeguard against malware, spyware, ransomware, adware, phishing, zero-day vulnerabilities, DoS, and backdoor attacks. By the end of the course, you'll be able to outline guidelines and best practices for securing against the most prevalent types of cybercrimes.
13 videos |
1h 16m
Assessment
Badge
Cloud Security Administration: Infrastructure Planning
Cloud infrastructure consists of the physical location of the cloud data center. Depending on the data center location, there are different risks that are taken by the service provider and different methods used to tackle security issues. A secure cloud is created by using open source software and creating a technical support pool. Additionally, basic security concepts like protecting data in motion and in rest using encryption can be employed so that clients can only see their data. In this course, you'll learn about baselining cloud infrastructure, different components like hardware and software, and challenges faced in cloud environments.
13 videos |
55m
Assessment
Badge
Ethical Hacker: Security Standards
Ethical hacking is not just random hacking attempts; it is a systematic testing of the target's security. For that reason, an understanding of security standards and formal testing methodologies is critical. Key concepts covered in this 11-video course include security standards such as NIST 800-115, a security standard which is integrally interconnected with ethical hacking and testing; and NIST 800-53, a security standard that can help users to professionalize and improve an ethical hacking test. Next, learn how to properly apply filtering and data validation; how to apply the NSA-IAM to ethical hacking to plan, execute, and report on your ethical hacking project; and how to apply the PTES to ethical hacking to plan, execute, and report on your ethical hacking project. Then learn about PCI-DSS standards and how to integrate them into ethical hacking; learn how to implement ISO 27001; and learn to interpret and apply NIST 800-12. Finally, learners observe how to employ NIST 800-26 standards to manage IT security; and learn about NIST 800-14 security protocols.
11 videos |
39m
Assessment
Badge
SecOps Engineer: System Infrastructure Security
This 13-video course explores SecOps (security and operations) engineering concepts. Learners will observe how security and operations are fused together, and learn to integrate system infrastructure security with normal business operations by applying engineering principles. Begin by learning the steps for infrastructure hardening of the operating system, including server workstations, routers, devices. You will examine server hardening, including how to turn off unneeded services, and remove unneeded software. Next, learn how to analyze and harden Windows 10, and to use security devices, and implement intrusion detection and prevention systems. You will examine the practical use of IDS (intrusion detection system) to detect activity that appears to be a possible intrusion, to log it, and to notify the administrator. You will then examine IPS (intrusion prevention system), which takes the additional step of shutting down the suspicious activity. Finally, you will explore firewall concepts, including stateless firewalls, how to use SPI (stateful packet inspection), and how to place them to improve your security network.
13 videos |
1h
Assessment
Badge
SecOps Engineer: Security Engineering
Explore fundaments of cybersecurity and engineering in this 10-video course, which examines the fundamental concepts of the CIA (confidentiality, integrity, and availability) triangle, and views security operations, security planning, engineering, application security through these three concepts. First, learners will examine the more advanced version: the McCumber Cube. You will learn to integrate systems engineering into cybersecurity, and explore requirements engineering, and how to gather requirements. Next, learn how to analyze them, to apply security requirements engineering techniques, and to finalize project requirements. You will be introduced to SecML (Security Modeling Language) which takes SysML (System Modeling Language) used by systems engineers, and to modify portions of it to be specific to cybersecurity. You will examine how SecML can be used to create both offensive and defensive security mitigation controls. This course examines security metrics, and how to apply engineering failure analysis methods to cybersecurity. Finally, you will observe how to incorporate security requirements engineering into cybersecurity, and the relevance of regulatory requirements.
10 videos |
33m
Assessment
Badge
CCSP 2019: Cloud System Architecture Design
Cloud services vary in size and complexity, and deployed architecture carries a direct impact on service and data asset security. In this 15-video course, learners explore aspects of cloud computing architectural design, along with associated cloud systems and components. Begin by looking at cloud component definitions and various cloud system participants: consumers, providers, partners, auditors, and regulators. Next, view operational characteristics of cloud computing: on-demand, self-service, broad network access, multi-tenancy, rapid elasticity and scalability, resource pooling, and measured service. Look at supporting architectural components and infrastructure of cloud computing such as virtualization and storage. Examine details of Cloud Computing Activities with reference to ISO/IEC 17789, clause 9. Learn how cloud service categories are based on supported services and capabilities such as application, platform, and infrastructure capability types, and examine cloud deployment categories and models. Learn about the responsibility of cloud services between customers and providers. Explore the impact of technologies such as machine learning, and examine business requirements and contracts and aspects of vendor and contract management. A final exercise covers supply chain management. This course will help a learner prepare for the (ISC)2 Certified Cloud Security Professional (CCSP) exam.
14 videos |
53m
Assessment
Badge
CCSP 2019: Implementing Data Discovery & Classification
Proper data governance begins with labeling data and applying security controls based on those labels. Explore information rights management (IRM) and challenges associated with data discovery, as well as the roles played by PKI (public key infrastructure) security certificates and virtual private networks (VPNs) in the cloud. This 6-video course prepares learners for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Begin with IRM objectives such as data rights, provisioning, and access models. Examine data discovery approaches and techniques for structured and unstructured data, and challenges of data discovery in the cloud. Then examine data classification, enabled by using Microsoft Azure Information protection for sensitive data such as Protected Health Information (PHI) and Personally Identifiable Information (PII), and cardholder data. Recognize how PKI provides security for digital IT solutions; how to use PowerShell to create PKI certificates; and how to generate certificates in a Microsoft Azure Key Vault. Learn how VPNs are used for secure cloud resource access. Then configure a Microsoft Azure point-to-site VPN and a custom Microsoft Azure Key Vault key for storage account encryption.
12 videos |
42m
Assessment
Badge
Information Security Program Development Part I
Create an effective information security program by examining the security technologies available, as well as techniques and best practices involved in meeting security regulations, standards, and guidelines.
9 videos |
52m
Assessment
Badge
CISM 2022: Information Security Governance
The best way to improve the enterprise security stance is to align IT security solutions with business objectives. In this course, you will consider how information security must align with business strategies. You will explore the business model for information security and review the importance of identifying and classifying assets critical to a business. Next, you will learn about supply chain security, personnel management, and the components of an information security program. You will discover the relationship between service-level agreements (SLAs) and organizational objectives and discuss the relevance of change and configuration management. Then, consider how to develop organizational security policies. Lastly, explore expense types, chain of custody, organizational culture, and how the Control Objectives for Information Technologies (COBIT) framework applies to IT governance. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
16 videos |
1h 40m
Assessment
Badge
CISM 2022: Security Standards
Global and local security standards, including laws and regulations, are an important input to determine how enterprises deploy and manage security controls. In this course, you will learn how the European Union's General Data Protection Regulation (GDPR) data privacy legislation applies to any organization world-wide handling private EU citizen data. Next, you will explore various International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) standards for proper data governance, followed by American data privacy and cloud security standards such as Health Insurance Portability and Accountability Act (HIPAA) and Federal Risk and Authorization Management Program (FedRamp). Discover how to secure cardholder data as related to Payment Card Industry Data Security Standard (PCI DSS) international security standards and review other data privacy legislation including Canada's Personal Information Protection and Electronic Documents Act (PIPEDA) and China's Personal Information Protection Law (PIPL). Lastly, explore the importance of securing cloud service usage in alignment with the Cloud Controls Matrix (CCM). This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
10 videos |
53m
Assessment
Badge
CISM 2022: Managing Risk
Residual risk remains after security controls are put in place to mitigate the impact of threats. The organizational appetite for risk determines what level of residual risk is acceptable. In this course, you will explore how risk management improves business operations by minimizing the impact of realized threats. You will learn how to calculate the cost of mitigating risk compared to the value of the protected asset and determine the cost-benefit analysis and return on investment when implementing security controls. Next, discover the importance of risk assessments, especially where there are changes to some aspect of the business or a specific business process. You will then explore how various risk approaches, such as risk acceptance, avoidance, transfer, and reduction, apply to an organization's tolerance of residual risk. Lastly, discover how risk heat maps are an effective method for communicating various degrees of risk. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
9 videos |
49m
Assessment
Badge
CISM 2022: Data Privacy
Enterprises must comply with relevant laws and regulations related to data privacy. This requires recognizing applicable laws and regulations and implementing the appropriate security controls. In this course, you will explore examples of personally identifiable information (PII) and protected health information (PHI) and learn about data residency implications related to the physical storage location of sensitive data. Next, learn how to reduce the possibility of data exfiltration through data loss protection policies and how to discover and classify data using Amazon Macie and Microsoft Purview governance. Then you will learn to configure data classification on the Microsoft Windows server platform and tag cloud resources for classification purposes. Lastly, explore how to configure Microsoft Azure storage account encryption using a customer-managed key. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
10 videos |
56m
Assessment
Badge
CISM 2022: Assessing Risk
Assessing risk is a crucial activity that enables organizations to evaluate risk exposure for business processes and assets. In this course, you will begin by exploring how to conduct vulnerability assessments and how the results can shed light on security control deficiencies. Next, you will learn how to perform a network vulnerability assessment and review the results, followed by scanning a web application for web app-specific vulnerabilities. You will discover how to conduct a gap analysis to determine the current security posture compared to a desired security posture. Then, you will explore the important aspects of when and how to run penetration tests. Lastly, you will see how to configure Microsoft Azure Policy assignments to determine cloud resource configuration compliance. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
8 videos |
45m
Assessment
Badge
CISM 2022: Cloud Computing & Coding
The use of cloud services is a form of outsourcing of IT service which also introduces an element of risk. Software developers can use on-premises as well as cloud-based services to create, test, and deploy software solutions. In this course, you will explore cloud deployment models including public, private, hybrid, and community clouds. You will then cover cloud computing service models, such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS), including where the security responsibility lies in each model. Next, you will explore various cloud-based security controls addressing a wide variety of cloud computing security needs. You will discover how to deploy a repeatable compliant cloud-based sandbox environment using Microsoft Azure Blueprints. Next, explore how security must be included in each software development life cycle (SDLC) phase as opposed to post-implementation. Finally, discover the importance of secure coding practices and how security must integrate with software development, testing, deployment, and patching. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
9 videos |
49m
Assessment
Badge
EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE TRACKS
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.