Jump to content

Become an IT Security Specialist (complete path)


Recommended Posts

 

1903152207310087.jpg

 

Become an IT Security Specialist (complete path)

English | Size: 2.87 GB

Category: CBTs

Learn the core concepts needed to secure your organization's network as an IT security specialist. In this learning path, you'll cover all the foundations of IT security: from practical skills for securing hardware and network data to the basics of cryptography and cybercrime investigation and response.

 

Course 1: IT Security Foundations: Core Concepts

 

Computing and Internet security are everyone's business, but it's especially critical for information technology specialists. Learning the core concepts of operating-system and network-level security helps avoid ongoing threats and eliminate system vulnerabilities. This beginner-level course covers core security concepts and introduces risks such as social engineering, malware, and spyware. Foundations of IT Security series creator Lisa Bock will also go over some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption.

 

Note: This course maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals 98-367 certification exam and is recommended test prep viewing.

Topics include:

Evaluating risks, threats, and vulnerabilities

Minimizing the attack surface

Avoiding worms and viruses

Protecting your system from spyware

Making web browsers more secure

Securing wireless transmissions

Encrypting files, folders, and drives

Using virtual private networks

 

Course 2: Cybersecurity Foundations

 

Set a rock solid foundation for your network, users, and data by learning about the basics of cybersecurity. Security expert Malcolm Shore shows how to assess and mitigate risks using various cybersecurity frameworks and control standards, such as NIST, COBIT 5, ISO 27000, and the Payment Card Industry Data Security Standard (PCI DSS). He'll also show how to detect hidden and cloaked files, evaluate and avoid threats such as malware, architect security to align with business needs using SABSA, manage user access, and prepare for and respond to cybersecurity incidents when they do occur.

 

By the end of this course, you'll have a greater understanding of the threats that affect private, corporate, and government networks, and the knowledge to prevent attacks and defeat them.

Topics include:

Dissecting cyber risk

Working with NIST, COBIT 5, DSS05, and other frameworks

Exploring cybercrime

Understanding how malware hides

Selecting security controls

Managing user access and identity

Monitoring your network

Managing incident response

 

Course 3: IT Security Foundations: Operating System Security

 

The operating system is where many attacks are targeted, which makes OS-level security just as important to your organization as network security. OS security is a key component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this course, Foundations of IT Security series creator Lisa Bock will also review user authentication, assigning permissions and Active Directory, along with creating audit policies, and how you can protect servers and email.

 

Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See [url=https://www.microsoft.com/learning/en-us/exam-98-367.aspx]https://www.microsoft.com/learning/en-us/exam-98-367.aspx for more information.

Topics include:

Creating strong passwords

Understanding biometric security

Adjusting permission behavior

Enabling auditing

OS hardening

Using the Microsoft Baseline Security Analyzer

Protecting email

 

Course 4: IT Security Foundations: Network Security

Course 5: Cybersecurity for IT Professionals

Course 6: Learning Secure Sockets Layer

Course 7: Cybersecurity with Cloud Computing

Course 8: Learning Computer Forensics

Course 9: Learning Cryptography and Network Security

Course 10: Learning Computer Security Investigation and Response

DOWNLOAD

(Buy premium account for maximum speed and resuming ability)

 

http://nitroflare.com/view/C7136D3AAEB52E3/vpkas.Become.an.IT.Security.Specialist.complete.path.part1.rar

http://nitroflare.com/view/AD8AB407DCD67F5/vpkas.Become.an.IT.Security.Specialist.complete.path.part2.rar

http://nitroflare.com/view/E3B5BAF365473BE/vpkas.Become.an.IT.Security.Specialist.complete.path.part3.rar

http://nitroflare.com/view/2E83D2A67418C8D/vpkas.Become.an.IT.Security.Specialist.complete.path.part4.rar

http://nitroflare.com/view/78C9A85A620BDE9/vpkas.Become.an.IT.Security.Specialist.complete.path.part5.rar

 

https://rapidgator.net/file/4ead917c6a52c4843655423f172a2b7f/vpkas.Become.an.IT.Security.Specialist.complete.path.part1.rar

https://rapidgator.net/file/c11da24690bed227c5319c0919e60c26/vpkas.Become.an.IT.Security.Specialist.complete.path.part2.rar

https://rapidgator.net/file/62def20f5b60f88da9fa6cabbfd3d223/vpkas.Become.an.IT.Security.Specialist.complete.path.part3.rar

https://rapidgator.net/file/4806554dfc9e1b12b6d0f6dbbce2705b/vpkas.Become.an.IT.Security.Specialist.complete.path.part4.rar

https://rapidgator.net/file/a2c13268ffd1aecabb65814a1b788610/vpkas.Become.an.IT.Security.Specialist.complete.path.part5.rar

 

http://turbobit.net/27mimk21damd/vpkas.Become.an.IT.Security.Specialist.complete.path.part1.rar.html

http://turbobit.net/hemcwepjg0mv/vpkas.Become.an.IT.Security.Specialist.complete.path.part2.rar.html

http://turbobit.net/1wh0ce736ho3/vpkas.Become.an.IT.Security.Specialist.complete.path.part3.rar.html

http://turbobit.net/q2q58fy0r3hx/vpkas.Become.an.IT.Security.Specialist.complete.path.part4.rar.html

http://turbobit.net/gllt7oql0fkq/vpkas.Become.an.IT.Security.Specialist.complete.path.part5.rar.html

 

 

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...