This learning path will equip you with the fundamental concepts required to secure your organization's network as an IT security specialist. You will learn practical skills for securing hardware and network data, as well as the basics of cryptography and cybercrime investigation and response. By the end of this course, you will have a strong foundation in IT security and be prepared to protect your organization's network from potential threats.
In today's world, our digital devices have become an integral part of our daily lives. However, with the increasing use of technology, the threat of cyberattacks has also risen. To avoid falling prey to such attacks, it is essential to learn the basics of securing our digital world. This beginner-level course covers fundamental security concepts, including strategies used by malicious actors to gain access to our systems using social engineering, malware, and spyware. The course also emphasizes basic wireless security practices, tips for enhancing browser security, and techniques for implementing encryption. Additionally, it provides insights on managing cookies while using a browser and best practices for securing devices and applications.
In this course, security expert Malcolm Shore provides a comprehensive overview of cybersecurity basics. He covers various cybersecurity frameworks and control standards, including NIST and COBIT, to help assess and mitigate risks. Malcolm explains cyber threats and how they operate, including advanced persistent threats and how cyber criminals hide their attacks. He also discusses managing cyber risk and the lifecycle of cybersecurity, from defense to incident response. Finally, Malcolm concludes with a discussion of international cyber norms and protocols.
In this course, Lisa Bock discusses the importance of OS-level security in addition to network security. She explains the process of securing an operating system, covering user authentication, Active Directory structure, permission assignment, and audit policies. Lisa also covers various cryptographic techniques and how to protect servers and email. The learning objectives of the course include defining "passphrase," understanding multifactor authentication, identifying the tool used in securing the file system in today's Windows operating systems, explaining what happens when a file is moved into a folder with permissions, naming the authentication protocol used in Active Directory, recognizing the location of audit logs, summarizing the purpose of hardening, and explaining the purpose of cryptographic techniques.
In this course, you will learn about network security and how to secure an organization's infrastructure. We will cover security devices such as firewalls and honeypots. You will also learn about the importance of isolating networks with VLANS and NAT addressing, as well as common security protocols. Additionally, we will discuss how to protect clients with antivirus software, encrypt folders and files, implement software restriction policies, and secure your cloud services. Physical security will also be covered, including securing a building's perimeter and the hardware within. By the end of this course, you will be able to list common devices used to protect and defend a network, summarize how VLANs can protect a network, give examples of how server and domain isolation can protect subnetworks, describe best practices for virtualization and container security, recognize the threat of password attacks, identify the different ways malicious actors can spoof protocols on a network, outline the various ways to use and secure protocols to minimize risk and prevent attacks, discuss how antivirus software protects your system against malware, describe the ways a security baseline can ensure that all device configuration settings are in-line with an organization's baseline metric, and list examples of ways to ensure physical security.
SSL and TLS are crucial for securing network communications through encryption and authentication. They are widely used to secure services like websites, VoIP, VPNs, and email messages. In this course, you will learn how to plan, implement, and maintain a PKI ecosystem that supports SSL/TLS security certificates. Instructor Daniel Lachance will guide you through installing and configuring PKI solutions in both Windows and Linux. You will learn about how certificates are issued and managed, how hashing provides integrity, and how digital signatures provide authentication. Additionally, you will learn about symmetric and asymmetric encryption, configuring a Linux OpenSSL PKI environment, acquiring web server and code-signing certificates, configuring a website with a certificate, securing files and folders with EFS, and configuring a TLS VPN.
This course covers the different types of cloud technology, including SaaS, PaaS, and IaaS, and the benefits and risks associated with each. It also explores the deployment models available and reviews offerings from Microsoft Azure, Amazon Web Services, and Google Apps. The course highlights the SecaaS capability of each platform, which can be used to identify unauthorized access and put cloud security defenses like encryption, logging, and monitoring into place. By the end of the course, learners will be able to differentiate between cloud services, identify their characteristics, apply security controls to cloud-based applications, and identify different types of cloud security controls.
Computer forensics is a technical field that involves finding legal evidence in computers, mobile devices, or data storage units. This course covers the essentials of computer forensics, including the goals of the field, the types of investigations it's used for, and the different specializations within it. Jungwoo Ryoo teaches how to prepare for an investigation, acquire data, ensure data is kept in its original state with software and hardware write blockers, analyze the data, and generate a report. He uses a combination of open-source and commercial software, so you'll be able to uncover the information you need with tools that are in your budget. The course covers learning objectives such as using a hex editor, file system fundamentals, partitioning a data storage device, ensuring data integrity with hashing, indexing and searching, and generating a report. By the end of the course, you'll have a solid understanding of computer forensics and be able to pursue a career in this exciting field.
Vulnerability management is a critical aspect for every organization to address. It goes beyond just patching OS systems. This course by Instructor Lora Vaughn McIntosh provides an overview of why vulnerabilities exist and explains the process of managing them from start to finish. The course covers the three key components of vulnerability management and the tools needed to establish a program of your own. You will learn about vulnerability scanning and reporting, how to identify which vulnerabilities to address first, how to vet false positives, and more.
Cybersecurity is crucial in the twenty-first century, and it all starts with threat modeling. This framework allows security professionals to think about potential risks and lays the foundation for their work. The traditional four-question framework defines the project, identifies potential issues, determines solutions, and ensures proper implementation. Additionally, the STRIDE model identifies six types of threats: spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege. Instructor Adam Shostack uses a billing system case study to demonstrate how to apply these principles and identify security and privacy issues. This allows developers to include appropriate configurations and controls in the operational design and rollout.
In this course, instructor Sam Sehgal explores how artificial intelligence (AI) can be used to solve complex cybersecurity problems. He covers the six main disciplines of AI and provides practical examples to illustrate their real-world applications. Sam also discusses how to use machine learning techniques to address security issues and avoid false positives. Additionally, he highlights the limitations and risks of using AI for security and shares tips on how to best prepare your organization for AI-driven security. By the end of the course, you will have a solid understanding of the foundational disciplines of AI and how to evaluate AI tools in the market.
This course aims to help cybersecurity professionals understand the ethical and moral debates surrounding their work. Instructor Jerod Brennen covers various situations that may arise in the workplace, including handling sensitive information, reporting ethical violations, and hacking back. He also delves into research-related situations, such as responsible disclosure and social engineering. The course concludes with practical guidance on putting ethics into practice and discusses the global impact of cybersecurity ethics on the workforce.
This course focuses on the importance of communication skills for information security professionals. It covers soft skills to cultivate, tips for engaging with different groups in the information security community, and general communication strategies. Instructor Jerod Brennen emphasizes the need to understand the perspective of the business and how to express research findings to colleagues. The course also provides guidance on using creativity to respond to problems without a clearly defined solution.