About this Learning Path
Learn the core concepts needed to secure your organization's network as an IT security specialist. In this learning path, you'll cover all the foundations of IT security: from practical skills for securing hardware and network data to the basics of cryptography and cybercrime investigation and response.
In this learning path,
- Learn the principles of IT security and cybersecurity.
- Develop practical skills for securing networks.
- Investigate cybercrimes and know the basics of computer forensics.
From | LinkedIn Learning |
---|---|
Hours | 26 |
Instructors | Lisa Bock, Malcolm Shore, Sean Colins, Jungwoo Ryoo, Sandra Toner, Lora Vaughn, Adam Shostack, Sam Sehgal |
Language | English |
Subjects | IT & Networking |
Similar Courses
Sorted by relevance
Careers
An overview of related careers and their average salaries in the US. Bars indicate income percentile (33rd - 99th).
CORE Coordinator $32k
Experis CORE Recruiter $43k
Assistant CORE Administrator $69k
Core Sales $72k
Core Systems Analyst $81k
Core FP&A Analyst $86k
Core Technology Engineer $96k
Core Management $102k
Research Scientist - Advanced Concepts Group $110k
Core Data Engineer $121k
Core Solutions Architect $179k
Principal Core Faculty $192k
Courses in this Learning Path
Listed in the order in which they should be taken
Starts | Course Information | |
---|---|---|
On Demand |
IT Security Foundations: Core Concepts Computing and Internet security are everyone's business, but it's especially critical for information technology specialists. Learning the core concepts of operating-system and... LinkedIn Learning |
Save
|
On Demand |
Set a rock solid foundation for your network, users, and data by learning about the basics of cybersecurity. Security expert Malcolm Shore shows how to assess and mitigate risks... LinkedIn Learning |
Save
|
On Demand |
IT Security Foundations: Operating System Security The operating system is where many attacks are targeted, which makes OS-level security just as important to your organization as network security. OS security is a key component... LinkedIn Learning |
Save
|
On Demand |
IT Security Foundations: Network Security Network security is the keystone of IT security, and an important component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this installment... LinkedIn Learning |
Save
|
On Demand |
Cybersecurity for IT Professionals Protect your network from cyber attacks. Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your... LinkedIn Learning |
Save
|
On Demand |
Secure Sockets Layer (SSL) is a cryptography protocol to protect web communication. LinkedIn Learning |
Save
|
On Demand |
Cybersecurity with Cloud Computing (2015) How do you keep your organization's files, applications, and accounts safe on the cloud? It starts with a considered design approach. In these videos, Malcolm Shore outlines the... LinkedIn Learning |
Save
|
On Demand |
Cybersecurity with Cloud Computing How do you keep your organization's files, applications, and accounts safe on the cloud? It starts with a considered design approach. In these videos, Malcolm Shore outlines the... LinkedIn Learning |
Save
|
On Demand |
Computer forensics is used to find legal evidence in computers, mobile devices, or data storage units. Although this course won't teach you everything you need to know to become a... LinkedIn Learning |
Save
|
On Demand |
Learning Vulnerability Management (You were viewing this course) Some people think that vulnerability management just means patching OS systems, but it's so much more than that. Vulnerability management is something every organization needs to... LinkedIn Learning |
Save
|
On Demand |
Learning Cryptography and Network Security Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of... LinkedIn Learning |
Save
|
On Demand |
Learning Threat Modeling for Security Professionals In the twenty-first century, no one doubts the importance of cybersecurity. Threat modeling is where it starts. Threat modeling is a framework for thinking about what can go... LinkedIn Learning |
Save
|
On Demand |
Learning Computer Security Investigation and Response Cybersecurity is a growing area of IT. Qualified computer forensics techs are in demand. But even if you aren't a forensics specialist, it can be useful to know how to collect... LinkedIn Learning |
Save
|
On Demand |
Securing Containers and Kubernetes Ecosystem Containers have transformed the way applications are built, deployed, and managed. But it’s only a matter a time before a vulnerability or misconfiguration leads to a newsworthy... LinkedIn Learning |
Save
|
From | LinkedIn Learning |
---|---|
Hours | 26 |
Instructors | Lisa Bock, Malcolm Shore, Sean Colins, Jungwoo Ryoo, Sandra Toner, Lora Vaughn, Adam Shostack, Sam Sehgal |
Language | English |
Subjects | IT & Networking |
Careers
An overview of related careers and their average salaries in the US. Bars indicate income percentile (33rd - 99th).
CORE Coordinator $32k
Experis CORE Recruiter $43k
Assistant CORE Administrator $69k
Core Sales $72k
Core Systems Analyst $81k
Core FP&A Analyst $86k
Core Technology Engineer $96k
Core Management $102k
Research Scientist - Advanced Concepts Group $110k
Core Data Engineer $121k
Core Solutions Architect $179k
Principal Core Faculty $192k
Similar Courses
Sorted by relevance