Bo0mB0oma Posted March 29, 2019 Report Share Posted March 29, 2019 Become an IT Security Specialist (complete path) English | Size: 2.87 GB Category: CBTs Learn the core concepts needed to secure your organization's network as an IT security specialist. In this learning path, you'll cover all the foundations of IT security: from practical skills for securing hardware and network data to the basics of cryptography and cybercrime investigation and response. Course 1: IT Security Foundations: Core Concepts Computing and Internet security are everyone's business, but it's especially critical for information technology specialists. Learning the core concepts of operating-system and network-level security helps avoid ongoing threats and eliminate system vulnerabilities. This beginner-level course covers core security concepts and introduces risks such as social engineering, malware, and spyware. Foundations of IT Security series creator Lisa Bock will also go over some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption. Note: This course maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals 98-367 certification exam and is recommended test prep viewing. Topics include: Evaluating risks, threats, and vulnerabilities Minimizing the attack surface Avoiding worms and viruses Protecting your system from spyware Making web browsers more secure Securing wireless transmissions Encrypting files, folders, and drives Using virtual private networks Course 2: Cybersecurity Foundations Set a rock solid foundation for your network, users, and data by learning about the basics of cybersecurity. Security expert Malcolm Shore shows how to assess and mitigate risks using various cybersecurity frameworks and control standards, such as NIST, COBIT 5, ISO 27000, and the Payment Card Industry Data Security Standard (PCI DSS). He'll also show how to detect hidden and cloaked files, evaluate and avoid threats such as malware, architect security to align with business needs using SABSA, manage user access, and prepare for and respond to cybersecurity incidents when they do occur. By the end of this course, you'll have a greater understanding of the threats that affect private, corporate, and government networks, and the knowledge to prevent attacks and defeat them. Topics include: Dissecting cyber risk Working with NIST, COBIT 5, DSS05, and other frameworks Exploring cybercrime Understanding how malware hides Selecting security controls Managing user access and identity Monitoring your network Managing incident response Course 3: IT Security Foundations: Operating System Security The operating system is where many attacks are targeted, which makes OS-level security just as important to your organization as network security. OS security is a key component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this course, Foundations of IT Security series creator Lisa Bock will also review user authentication, assigning permissions and Active Directory, along with creating audit policies, and how you can protect servers and email. Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See [url=https://www.microsoft.com/learning/en-us/exam-98-367.aspx]https://www.microsoft.com/learning/en-us/exam-98-367.aspx for more information. Topics include: Creating strong passwords Understanding biometric security Adjusting permission behavior Enabling auditing OS hardening Using the Microsoft Baseline Security Analyzer Protecting email Course 4: IT Security Foundations: Network Security Course 5: Cybersecurity for IT Professionals Course 6: Learning Secure Sockets Layer Course 7: Cybersecurity with Cloud Computing Course 8: Learning Computer Forensics Course 9: Learning Cryptography and Network Security Course 10: Learning Computer Security Investigation and Response DOWNLOAD (Buy premium account for maximum speed and resuming ability) http://nitroflare.com/view/C7136D3AAEB52E3/vpkas.Become.an.IT.Security.Specialist.complete.path.part1.rar http://nitroflare.com/view/AD8AB407DCD67F5/vpkas.Become.an.IT.Security.Specialist.complete.path.part2.rar http://nitroflare.com/view/E3B5BAF365473BE/vpkas.Become.an.IT.Security.Specialist.complete.path.part3.rar http://nitroflare.com/view/2E83D2A67418C8D/vpkas.Become.an.IT.Security.Specialist.complete.path.part4.rar http://nitroflare.com/view/78C9A85A620BDE9/vpkas.Become.an.IT.Security.Specialist.complete.path.part5.rar https://rapidgator.net/file/4ead917c6a52c4843655423f172a2b7f/vpkas.Become.an.IT.Security.Specialist.complete.path.part1.rar https://rapidgator.net/file/c11da24690bed227c5319c0919e60c26/vpkas.Become.an.IT.Security.Specialist.complete.path.part2.rar https://rapidgator.net/file/62def20f5b60f88da9fa6cabbfd3d223/vpkas.Become.an.IT.Security.Specialist.complete.path.part3.rar https://rapidgator.net/file/4806554dfc9e1b12b6d0f6dbbce2705b/vpkas.Become.an.IT.Security.Specialist.complete.path.part4.rar https://rapidgator.net/file/a2c13268ffd1aecabb65814a1b788610/vpkas.Become.an.IT.Security.Specialist.complete.path.part5.rar http://turbobit.net/27mimk21damd/vpkas.Become.an.IT.Security.Specialist.complete.path.part1.rar.html http://turbobit.net/hemcwepjg0mv/vpkas.Become.an.IT.Security.Specialist.complete.path.part2.rar.html http://turbobit.net/1wh0ce736ho3/vpkas.Become.an.IT.Security.Specialist.complete.path.part3.rar.html http://turbobit.net/q2q58fy0r3hx/vpkas.Become.an.IT.Security.Specialist.complete.path.part4.rar.html http://turbobit.net/gllt7oql0fkq/vpkas.Become.an.IT.Security.Specialist.complete.path.part5.rar.html Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now