YoVDO

Become an IT Security Specialist

Offered By: LinkedIn Learning

Tags

Information Security (InfoSec) Courses Cryptography Courses Network Security Courses Cloud Security Courses Operating System Security Courses Threat Modeling Courses Vulnerability Management Courses

Course Description

Overview

Learn the core concepts needed to secure your organization's network as an IT security specialist. In this learning path, you'll cover all the foundations of IT security: from practical skills for securing hardware and network data to the basics of cryptography and cybercrime investigation and response.
  • Learn the principles of IT security and cybersecurity.
  • Develop practical skills for securing networks.
  • Investigate cybercrimes and know the basics of computer forensics.

Syllabus

Courses under this program:
Course 1: IT Security Foundations: Core Concepts
-Prepare for MTA exam 98-367, Security Fundamentals. Learn the core concepts of operating system and network-level security to avoid threats and eliminate system vulnerabilities.

Course 2: Cybersecurity Foundations
-Set a rock-solid foundation for your network, users, and data by learning the basics of cybersecurity. Explore key frameworks, threats, and strategies for responding to incidents.

Course 3: IT Security Foundations: Operating System Security
-Whether you’re using Windows, macOS, or Linux, learn how to secure your operating system against attacks.

Course 4: IT Security Foundations: Network Security
-Learn how to secure an organization's network to keep your interconnected systems and data safe and prepare for Microsoft Technology Associate (MTA) exam 98-367.

Course 5: Learning SSL/TLS
-Learn the skills you need to plan, implement, and maintain a public key infrastructure (PKI) ecosystem that supports SSL/TLS security certificates.

Course 6: Cybersecurity with Cloud Computing
-Discover how to use cybersecurity to mitigate your cloud computing risk. Learn how to secure cloud services such as Amazon Web Services, Google Apps, and Azure.

Course 7: Learning Computer Forensics
-Learn how to acquire and analyze data from computers or storage devices with computer forensics.

Course 8: Learning Vulnerability Management
-Learn the basics of vulnerability management. Discover why vulnerabilities exist, as well as how to manage them from start to finish.

Course 9: Learning Threat Modeling for Security Professionals
-Threat modeling helps security professionals understand what can go wrong—and what to do about it. Learn to use the four-question and STRIDE frameworks for threat modeling.

Course 10: Artificial Intelligence for Cybersecurity
-Learn how to leverage artificial intelligence (AI) to solve complex problems in the field of information security. Along the way, explore the risks of using AI for security.

Course 11: Ethics in Information Security
-Learn about the ethics of working in cybersecurity and how to have challenging conversations about those ethics.

Course 12: Soft Skills for Information Security Professionals
-Information security isn’t all ones and zeros. Learn how to communicate security concepts and proposals in terms that will resonate with audiences of all technical abilities.


Courses

  • 0 reviews

    2 hours 24 minutes

    View details
    Learn the skills you need to plan, implement, and maintain a public key infrastructure (PKI) ecosystem that supports SSL/TLS security certificates.
  • 0 reviews

    46 minutes

    View details
    Threat modeling helps security professionals understand what can go wrong—and what to do about it. Learn to use the four-question and STRIDE frameworks for threat modeling.
  • 0 reviews

    2 hours 42 minutes

    View details
    Learn how to acquire and analyze data from computers or storage devices with computer forensics.
  • 0 reviews

    55 minutes

    View details
    Learn the basics of vulnerability management. Discover why vulnerabilities exist as well as how to manage them from start to finish.
  • 0 reviews

    1-2 hours

    View details
    Learn how to leverage artificial intelligence (AI) to solve complex problems in the field of information security. Along the way, explore the risks of using AI for security.
  • 0 reviews

    1-2 hours

    View details
    Set a rock-solid foundation for your network, users, and data by learning the basics of cybersecurity. Explore key frameworks, threats, and strategies for responding to incidents.
  • 0 reviews

    2-3 hours

    View details
    Discover how to use cybersecurity to mitigate your cloud computing risk. Learn how to secure cloud services such as Amazon Web Services, Google Apps, and Azure.
  • 0 reviews

    57 minutes

    View details
    Learn about the ethics of working in cybersecurity and how to have challenging conversations about those ethics.
  • 0 reviews

    1-2 hours

    View details
    Prepare for MTA exam 98-367, Security Fundamentals. Learn the core concepts of operating system and network-level security to avoid threats and eliminate system vulnerabilities.
  • 0 reviews

    2-3 hours

    View details
    Learn how to secure an organization's network to keep your interconnected systems and data safe and prepare for Microsoft Technology Associate (MTA) exam 98-367.
  • 0 reviews

    1-2 hours

    View details
    Whether you’re using Windows, macOS, or Linux, learn how to secure your operating system against attacks.
  • 0 reviews

    1-2 hours

    View details
    Information security isn’t all ones and zeros. Learn how to communicate security concepts and proposals in terms that will resonate with audiences of all technical abilities.

Taught by

Lisa Bock, Malcolm Shore, Dan Lachance, Jungwoo Ryoo, Lora Vaughn, Adam Shostack, Sam Sehgal and Jerod Brennen

Related Courses

The Foundations of Cybersecurity
University System of Georgia via Coursera
Introduction to Cybersecurity
SecurityScoreCard via Udacity
TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-003)
Udemy
Fundamentals of Internet Security | Secure Your Environment
Udemy
Ciberseguridad en linea
Udemy