» » » Become an IT Security Specialist (complete path)
Information to the news
  • Views: 12
  • Author: rukensai
  • Date: 17-03-2019, 12:02
17-03-2019, 12:02

Become an IT Security Specialist (complete path)

Category: Tutorials / Programming

Become an IT Security Specialist (complete path)

Become an IT Security Specialist (complete path) | 2.87 GB
Category: CBTs

Learn the core concepts needed to secure your organization’s network as an IT security specialist. In this learning path, you’ll cover all the foundations of IT security: from practical skills for securing hardware and network data to the basics of cryptography and cybercrime investigation and response.

Course 1: IT Security Foundations: Core Concepts

Computing and Internet security are everyone’s business, but it’s especially critical for information technology specialists. Learning the core concepts of operating-system and network-level security helps avoid ongoing threats and eliminate system vulnerabilities. This beginner-level course covers core security concepts and introduces risks such as social engineering, malware, and spyware. Foundations of IT Security series creator Lisa Bock will also go over some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption.

Note: This course maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals 98-367 certification exam and is recommended test prep viewing.
Topics include:
Evaluating risks, threats, and vulnerabilities
Minimizing the attack surface
Avoiding worms and viruses
Protecting your system from spyware
Making web browsers more secure
Securing wireless transmissions
Encrypting files, folders, and drives
Using virtual private networks

Course 2: Cybersecurity Foundations

Set a rock solid foundation for your network, users, and data by learning about the basics of cybersecurity. Security expert Malcolm Shore shows how to assess and mitigate risks using various cybersecurity frameworks and control standards, such as NIST, COBIT 5, ISO 27000, and the Payment Card Industry Data Security Standard (PCI DSS). He’ll also show how to detect hidden and cloaked files, evaluate and avoid threats such as malware, architect security to align with business needs using SABSA, manage user access, and prepare for and respond to cybersecurity incidents when they do occur.

By the end of this course, you’ll have a greater understanding of the threats that affect private, corporate, and government networks, and the knowledge to prevent attacks and defeat them.
Topics include:
Dissecting cyber risk
Working with NIST, COBIT 5, DSS05, and other frameworks
Exploring cybercrime
Understanding how malware hides
Selecting security controls
Managing user access and identity
Monitoring your network
Managing incident response

Course 3: IT Security Foundations: Operating System Security

The operating system is where many attacks are targeted, which makes OS-level security just as important to your organization as network security. OS security is a key component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this course, Foundations of IT Security series creator Lisa Bock will also review user authentication, assigning permissions and Active Directory, along with creating audit policies, and how you can protect servers and email.

Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/en-us/exam-98-367.aspx]www.microsoft.com/learning/en-us/exam-98-367.aspx for more information.
Topics include:
Creating strong passwords
Understanding biometric security
Adjusting permission behavior
Enabling auditing
OS hardening
Using the Microsoft Baseline Security Analyzer
Protecting email

Course 4: IT Security Foundations: Network Security
Course 5: Cybersecurity for IT Professionals
Course 6: Learning Secure Sockets Layer
Course 7: Cybersecurity with Cloud Computing
Course 8: Learning Computer Forensics
Course 9: Learning Cryptography and Network Security
Course 10: Learning Computer Security Investigation and Response

Download link:

Links are Interchangeable - Single Extraction - Premium is support resumable
скачать dle 12.0
Dear visitor, you entered the site as an unregistered user.
We recommend you to register or login to the website using your name.