Aspire Journeys
722 Information Systems Security Manager Basic KSAT Journey
- 21 Courses | 22h 53m 51s
Responsible for the cybersecurity of a program, organization, system, or enclave.
722 Information Systems Security Manager Basic
Responsible for the cybersecurity of a program, organization, system, or enclave.
- 21 Courses | 22h 53m 51s
COURSES INCLUDED
CompTIA IT Fundamentals: Internet, Storage, & Computer Systems
When computers first hit the scene, they were a marvel and a mystery to most individuals, but accessibility improvements over time allowed them to become moderately more useful. They then began to extraordinarily change the world with the advent of the Internet. In this course, discover the role and features of the Internet, storage, and computer systems, beginning with the various Internet connection technologies and computer storage types. Next, learn about the various types of computers and the features of mobile phones, tablet devices, and gaming systems. Finally, explore an overview of the Internet of Things (IoT) and the technological advances that enable IoT. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
14 videos |
1h 29m
Assessment
Badge
CompTIA IT Fundamentals: Operating Systems
Computers need software to function, and that software has changed fundamentally since the very first computers were created. Nowadays, sophisticated operating systems (OSs) are used to perform everyday tasks. In this course, learn about computer operating systems, including the types and basic features of OSs and the application hardware interface. Next, explore Windows management, including managing applications, devices, users, and access control. Finally, investigate file systems, key OS features, task scheduling, and common methods for tweaking a Windows OS, including using command line interfaces (CLIs) to perform operations. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
18 videos |
2h 24m
Assessment
Badge
CompTIA IT Fundamentals: CIA Triad
Computer data is created at a rate that we can barely comprehend. Much of that information is immensely useful and readily available to anyone, but there is a large contingent of information that is and should remain confidential. In this course, you will explore the CIA triad, beginning with the principle of least privilege and concerns surrounding confidentiality, integrity, and availability. Then you will learn about methods for protecting information, including antivirus and antimalware software, firewalls, password security, and safe browsing. Finally, you will discover the importance of patching and updates, best practices for device security, and removing unwanted software. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
17 videos |
1h 43m
Assessment
Badge
CompTIA A+ Core 1: Cloud Computing Concepts
Cloud computing allows users to store and access data and programs over the internet instead of a local hard drive. In this course, explore cloud computing concepts such as cloud model types, resource sharing, measure service, and virtual desktops. Discover the features of Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS); and learn how to differentiate between public, private, hybrid, and community cloud infrastructures. Discover key differences between internal and external shared resources and explore rapid elasticity, a feature that allows for scalable provisioning. Finally, examine the considerations and benefits of using a measured service or a metered service and investigate the types of virtual desktops and their purposes. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification.
11 videos |
1h 17m
Assessment
Badge
CompTIA A+ Core 2: Desktop, Server, & Mobile Operating Systems
Technicians must be aware of the features and installation requirements of various types of operating systems. Use this course to learn about common OS types and how to perform OS installations and upgrades in a diverse OS environment. Begin by exploring the features of Windows, Linux, macOS, ChromeOS, and mobile device operating systems. Discover available OS installation options and plan an operating system deployment strategy after reviewing various installation methods. Finally, perform the installation of a Windows 10, Windows Server 2019, Ubuntu Linux, and macOS system. Once you have completed this course, you will be able to select the appropriate operating system for a given scenario and plan its deployment. This course will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
14 videos |
1h 18m
Assessment
Badge
CompTIA A+ Core 2: Operating System & Network Management
Understanding the network connectivity options in modern operating systems is a vital skill you need as a technician. In this course, you will explore various GUI management tools that can be used when working in Windows. Learn to navigate and configure Control Panel settings and discover how to utilize networking commands in Windows and Linux, and management tools for macOS. Next, you will review how IP addressing, DNS, and DHCP works and observe how to configure Windows DNS and DHCP servers. Finally, learn how to manage various network settings, including those related to Windows Defender and Microsoft Active Directory. Upon completion of this course, you'll be able to use command-line management tools and manage network-related settings in Windows, Linux, and the macOS. This course will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
16 videos |
1h 50m
Assessment
Badge
CompTIA A+ Core 2: Backup & Recovery Methods
Backing up data is the practice of copying data from a primary to a secondary location. Regular backups are essential when attempting to recover from a primary data failure. Backups should be performed regularly in both personal and business scenarios. In this course, explore disaster prevention techniques and recovery best practices. Discover how to differentiate between full, incremental, differential, and synthetic backups, and learn when to implement each method. Next, explore backup frequency timelines that can help ensure regular data backups. Discover how to differentiate between on-site and off-site backup rotation schemes, and lastly, explore backup rotation schemes including grandfather-father-son (GFS) and the 3-2-1 backup rule. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
7 videos |
46m
Assessment
Badge
Certified in Cybersecurity (CC): Core Security Principles & Risk Management
It is of high importance that organizations operate upon a solid foundation of security principles, concepts, and risk management. It is impossible to reduce security risk until core security and risk management principles are defined. In this course, explore the elements of the confidentiality, integrity, and availability (CIA) triad, along with the essentials of authentication and using non-repudiation services. Next, examine what risk is and the terminology surrounding risk management, threats, and vulnerability. Finally, learn about risk assessment, identification, and treatment and compare qualitative and quantitative risk analysis. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
11 videos |
32m
Assessment
Badge
Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
Security governance is a huge part of overall corporate or organizational governance. The security practitioner must be aware of various governance elements, regulations, laws, standards, policies, and procedures. Begin this course by exploring the elements of governance, including mission charter, leadership, and corporate guidance. Then investigate various laws and regulations like General Data Protection Regulation (GDPR) and HIPAA, standards issued by the International Organization for Standardization and International Electrotechnical Commission (ISO/IEC), and the National Institute of Standards and Technology (NIST), and common policies and standard operating procedures. Next, examine the International Information System Security Certification Consortium (ISC2) code of ethics. Finally, discover security control categories and types. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos |
25m
Assessment
Badge
Certified in Cybersecurity (CC): Incident Response
Practically anything that occurs in the enterprise can be called an event, but not all events are negative occurrences. It is the problematic events that are managed with the incident response practice. In this course, you will begin by exploring incident terminology and the goal of incident response. Next, discover the phases of the incident response lifecycle: Preparation, Detection and Analysis, Containment, and Post-incident Activities. Finally, you will explore additional incident response topics, including incident response teams, forensics, and problem management. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos |
28m
Assessment
Badge
Certified in Cybersecurity (CC): Business Continuity Planning
Many organizations nowadays have become aware of the need for business continuity planning, also known as continuity of operations. The main objective of a business continuity plan (BCP) is for an organization to maintain organizational operations while recovering from a major interruption. In this course, explore the importance and goals of business continuity and continuity of operations, as well as the components of a business continuity plan. Next, learn about business impact analysis (BIA), backup and restore policies, and disaster recovery plans. Finally, investigate the various tests and drills that incident response and business continuity plans should be subjected to. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos |
30m
Assessment
Badge
Certified in Cybersecurity (CC): Logical Access Controls
There is often a blurred line between physical and logical access control, as the systems typically function together. In this course, you will explore the logical aspect of Defense in Depth and security controls. Next, you will examine discretionary access control (DAC) and mandatory access control (MAC). Finally, you will define role-based access control (RBAC), rule-based access control (RuBAC), and attribute-based access control (ABAC) and learn about their differences. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
9 videos |
20m
Assessment
Badge
Certified in Cybersecurity (CC): Networking & Security Infrastructure
Although new security practitioners can come from development, database, or other backgrounds, the majority of security professionals come from a networking background. It is virtually impossible to separate networking knowledge from security expertise. Begin this course by exploring network types, network devices, and device addressing mechanisms. Then you will discover the Open Systems Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) reference models, logical ports, and the TCP handshake. Next, you will focus on transport layer security (TLS) and IP security (IPsec). Finally, you will examine virtual LANs (VLANs) and Wi-Fi fundamentals. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
12 videos |
45m
Assessment
Badge
Certified in Cybersecurity (CC): Present Threats & Network Security Controls
The constant emergence of new security threats, variants, vectors, and technologies is an ongoing challenge to keep up with. In this course, learn about threats, attacks, and threat prevention tools and methods, such as advanced persistent threats (APT) and intrusion detection and intrusion prevention systems. Next, investigate data center security, secure cloud computing, and elements of secure network design, including HVAC and environmental controls, zoning, and VLANs. Finally, explore Zero Trust security initiatives and micro-segmentation, such as network access control (NAC), software-defined networks, and IoT. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos |
38m
Assessment
Badge
Certified in Cybersecurity (CC): Data Security & System Hardening
For many organizations, data is the most critical asset to be secured. Begin this course by exploring the data life cycle, or the different phases a piece of data goes through, from data creation to data destruction. You will focus on each of the six phases, including create, store, use, share, archive, and destroy. Then, you will learn how to log and monitor security events using modern enterprise and cloud-based solutions. Next, you will investigate encryption, hashing, and digital signing. Finally, you will discover system hardening practices like patch management. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
11 videos |
29m
Assessment
Badge
Agile Organizations: Cloud for Agile Software Development
The cloud has various deployment and service models that can be combined with Agile software development methodologies to help your organization design and create your very own cloud strategy based on your organization's needs. In this course, you'll learn about Agile software development, cloud management, cloud identity and access management, the cloud physical infrastructure, the cloud logical infrastructure, and cloud privacy. Next, you'll examine the available cloud deployment models such as public, private, hybrid, community, and virtual public clouds, as well as multi-cloud and multitenancy environments. You'll then move on to explore cloud service models such as Infrastructure as a Service, Platform as a Service, and Software as a Service. Finally, you'll learn about advanced topics such the Internet of Things.
14 videos |
1h 18m
Assessment
Badge
Security Programming: System Essentials
In this 14-video course, learners will explore how Linux-based systems operate, communicate, and manage the underlying information they contain. Begin by examining management and monitoring tools available in Unix and Linux environments. Then learn to work with user accounts and domain names, and learn how to monitor user and system activity. You will learn how to securely connect to remote servers by using secure shell (SSH), and how to work with user accounts. This course examines elements of both an Internet Protocol routing table and a network interface, and demonstrates how to perform Domain Name System lookups. Learners will examine log files for monitoring critical events on a Linux system and use the PS command to retrieve process information. You will learn how to retrieve disk usage, partition information, and directory contents of a Linux system, and how to monitor both user and system activity on a Linux system. Finally, this course demonstrates how to configure time and date services and explore system configurations in the /etc folder of a Unix system.
14 videos |
56m
Assessment
Badge
CyberOps Windows Hardening: Windows Server Hardening Best Practices
Windows servers are the heart of many corporate networks and may contain sensitive company data that, if leaked or stolen by an attacker, would be catastrophic. Protecting the Windows Server assets and preventing a security compromise is an important skill for IT security professionals to master. In this course, you'll learn how to help prevent security incidents by hardening the Windows Server and reducing the attack surface. You'll learn how to follow common security best practices to lock down a Windows system by hardening user accounts, passwords, services, the file system, and common network services, such as DNS and IIS.
16 videos |
1h 32m
Assessment
Badge
Cloud Data Platforms: Cloud Computing
Cloud computing has revolutionized the way we build, deploy, and maintain applications. Due to this paradigm shift, many businesses now rent rather than own IT infrastructure. This new way of approaching infrastructure requirements has given way to multiple cloud computing models, such as Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), and Function as a Service (FaaS). Knowing what your options are for cloud computing can help you choose the best models for your needs. Use this course to gain a solid foundational understanding of cloud computing. Compare various cloud service providers based on services, available tools, and pricing. Learn about real-life use cases for cloud computing and how businesses can benefit from this ever-evolving technological feat. When you've completed this course, your newfound knowledge of cloud computing will help you decide how it can help your business.
12 videos |
46m
Assessment
Badge
Managing Enterprise InfoSec Risks & Risk Tolerance
IT security risks can be defined as a combination of the consequences of an event and the associated likelihood of occurrence. They can be managed by an organization through asset-safeguarding strategies. Through this course, learn about managing enterprise information security (InfoSec) risk and risk tolerance. Explore the definition of risk, how it differs from threats and vulnerabilities, and the history of information security. Next, discover common threats to IT systems and data, how to identify and manage security risks, and the key differences between quantitative and qualitative risk analysis. Finally, learn about common risk assessment tools and the differences between penetration testing and vulnerability assessments. Upon completion, you'll be able to outline and manage IT security risks.
15 videos |
1h 44m
Assessment
Badge
InfoSec Crisis Management & Incident Response
Not only do IT security teams need to be ready to identify security incidents, but they also need to be able to respond to and manage the environment during a crisis. In this course, you'll explore the term 'crisis' and identify crisis management practices. Discover the key components of an organizational crisis readiness program, including planning, training, technology, tools, and continuous improvement. Next, investigate the roles and responsibilities of a crisis management team, examine measures to minimize disruptions, and determine how incident response planning can help organizations better respond to critical incidents. Then, investigate how to best identify incidents and learn how early detection of incidents can be crucial to containing threats. Lastly, explore the various steps of a typical incident response plan, focusing on identification, containment, investigation, eradication, recovery, and lessons learned. After completing this course, you will be able to recognize what constitutes a crisis and respond to and manage security incidents.
15 videos |
1h 34m
Assessment
Badge
EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE TRACKS
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.