Become an IT Security Specialist
Offered By: LinkedIn Learning
Course Description
Overview
Learn the core concepts needed to secure your organization's network as an IT security specialist. In this learning path, you'll cover all the foundations of IT security: from practical skills for securing hardware and network data to the basics of cryptography and cybercrime investigation and response.
- Learn the principles of IT security and cybersecurity.
- Develop practical skills for securing networks.
- Investigate cybercrimes and know the basics of computer forensics.
Syllabus
- Course 1: IT Security Foundations: Core Concepts
- Prepare for MTA exam 98-367, Security Fundamentals. Learn the core concepts of operating system and network-level security to avoid threats and eliminate system vulnerabilities.
- Course 2: Cybersecurity Foundations
- Set a rock-solid foundation for your network, users, and data by learning the basics of cybersecurity. Explore key frameworks, threats, and strategies for responding to incidents.
- Course 3: IT Security Foundations: Operating System Security
- Learn how to secure a Windows operating system as you prepare to take and pass the Microsoft Technology Associate (MTA) exam 98-367, Security Fundamentals.
- Course 4: IT Security Foundations: Network Security
- Learn how to secure an organization's network to keep your interconnected systems and data safe and prepare for Microsoft Technology Associate (MTA) exam 98-367.
- Course 5: Learning SSL/TLS
- Learn the skills you need to plan, implement, and maintain a public key infrastructure (PKI) ecosystem that supports SSL/TLS security certificates.
- Course 6: Cybersecurity with Cloud Computing
- Discover how to use cybersecurity to mitigate your cloud computing risk. Learn how to secure cloud services such as Amazon Web Services, Google Apps, and Azure.
- Course 7: Learning Computer Forensics
- Learn how to acquire and analyze data from computers or storage devices with computer forensics.
- Course 8: Learning Vulnerability Management
- Learn the basics of vulnerability management. Discover why vulnerabilities exist, as well as how to manage them from start to finish.
- Course 9: Learning Threat Modeling for Security Professionals
- Threat modeling helps security professionals understand what can go wrong—and what to do about it. Learn to use the four-question and STRIDE frameworks for threat modeling.
- Course 10: Artificial Intelligence for Cybersecurity
- Learn how to leverage artificial intelligence (AI) to solve complex problems in the field of information security. Along the way, explore the risks of using AI for security.
- Course 11: Securing Containers and Kubernetes Ecosystem
- Learn best practices and security controls for containers and the Kubernetes ecosystem using a simple five-factor security model.
- Course 12: Soft Skills for Information Security Professionals
- Information security isn’t all ones and zeros. Learn how to communicate security concepts and proposals in terms that will resonate with audiences of all technical abilities.
Taught by
Lisa Bock, Malcolm Shore, Lisa Bock, Lisa Bock, Dan Lachance, Malcolm Shore, Jungwoo Ryoo, Lora Vaughn, Adam Shostack, Sam Sehgal, Sam Sehgal and Jerod Brennen
Related Courses
5G for EveryoneQualcomm via Coursera Advanced Cyber Security Training
EC-Council via FutureLearn Working with tcpdump Filters
Coursera Project Network via Coursera Cloud Computing Fundamentals on Alibaba Cloud
Alibaba Cloud Academy via Coursera Protecting Cloud Architecture with Alibaba Cloud
Alibaba via Coursera