Save For Later

Become an IT Security Specialist

Save For Later

Learn the core concepts needed to secure your organization's network as an IT security specialist. In this learning path, you'll cover all the foundations of IT security: from practical skills for securing hardware and network data to the basics of cryptography and cybercrime investigation and response.

In this learning path,

  • Learn the principles of IT security and cybersecurity.
  • Develop practical skills for securing networks.
  • Investigate cybercrimes and know the basics of computer forensics.

OpenCourser is an affiliate partner of LinkedIn Learning and may earn a commission when you buy through our links.

From LinkedIn Learning
Hours 26
Instructors Lisa Bock, Malcolm Shore, Sean Colins, Jungwoo Ryoo, Sandra Toner, Lora Vaughn, Adam Shostack, Sam Sehgal
Language English
Subjects IT & Networking

Similar Courses

Sorted by relevance

Careers

An overview of related careers and their average salaries in the US. Bars indicate income percentile (33rd - 99th).

CORE Coordinator $32k

Experis CORE Recruiter $43k

Assistant CORE Administrator $69k

Core Sales $72k

Core Systems Analyst $81k

Core FP&A Analyst $86k

Core Technology Engineer $96k

Core Management $102k

Research Scientist - Advanced Concepts Group $110k

Core Data Engineer $121k

Core Solutions Architect $179k

Principal Core Faculty $192k

Courses in this Learning Path

Listed in the order in which they should be taken

Starts Course Information

On Demand

IT Security Foundations: Core Concepts (You were viewing this course)

Computing and Internet security are everyone's business, but it's especially critical for information technology specialists. Learning the core concepts of operating-system and...

LinkedIn Learning

Save

On Demand

Cybersecurity Foundations

Set a rock solid foundation for your network, users, and data by learning about the basics of cybersecurity. Security expert Malcolm Shore shows how to assess and mitigate risks...

LinkedIn Learning

Save

On Demand

IT Security Foundations: Operating System Security

The operating system is where many attacks are targeted, which makes OS-level security just as important to your organization as network security. OS security is a key component...

LinkedIn Learning

Save

On Demand

IT Security Foundations: Network Security

Network security is the keystone of IT security, and an important component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this installment...

LinkedIn Learning

Save

On Demand

Cybersecurity for IT Professionals

Protect your network from cyber attacks. Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your...

LinkedIn Learning

Save

On Demand

Learning Secure Sockets Layer

Secure Sockets Layer (SSL) is a cryptography protocol to protect web communication.

LinkedIn Learning

Save

On Demand

Cybersecurity with Cloud Computing (2015)

How do you keep your organization's files, applications, and accounts safe on the cloud? It starts with a considered design approach. In these videos, Malcolm Shore outlines the...

LinkedIn Learning

Save

On Demand

Cybersecurity with Cloud Computing

How do you keep your organization's files, applications, and accounts safe on the cloud? It starts with a considered design approach. In these videos, Malcolm Shore outlines the...

LinkedIn Learning

Save

On Demand

Learning Computer Forensics

Computer forensics is used to find legal evidence in computers, mobile devices, or data storage units. Although this course won't teach you everything you need to know to become a...

LinkedIn Learning

Save

On Demand

Learning Vulnerability Management

Some people think that vulnerability management just means patching OS systems, but it's so much more than that. Vulnerability management is something every organization needs to...

LinkedIn Learning

Save

On Demand

Learning Cryptography and Network Security

Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of...

LinkedIn Learning

Save

On Demand

Learning Threat Modeling for Security Professionals

In the twenty-first century, no one doubts the importance of cybersecurity. Threat modeling is where it starts. Threat modeling is a framework for thinking about what can go...

LinkedIn Learning

Save

On Demand

Learning Computer Security Investigation and Response

Cybersecurity is a growing area of IT. Qualified computer forensics techs are in demand. But even if you aren't a forensics specialist, it can be useful to know how to collect...

LinkedIn Learning

Save

On Demand

Securing Containers and Kubernetes Ecosystem

Containers have transformed the way applications are built, deployed, and managed. But it’s only a matter a time before a vulnerability or misconfiguration leads to a newsworthy...

LinkedIn Learning

Save

LinkedIn Learning

From LinkedIn Learning
Hours 26
Instructors Lisa Bock, Malcolm Shore, Sean Colins, Jungwoo Ryoo, Sandra Toner, Lora Vaughn, Adam Shostack, Sam Sehgal
Language English
Subjects IT & Networking

Careers

An overview of related careers and their average salaries in the US. Bars indicate income percentile (33rd - 99th).

CORE Coordinator $32k

Experis CORE Recruiter $43k

Assistant CORE Administrator $69k

Core Sales $72k

Core Systems Analyst $81k

Core FP&A Analyst $86k

Core Technology Engineer $96k

Core Management $102k

Research Scientist - Advanced Concepts Group $110k

Core Data Engineer $121k

Core Solutions Architect $179k

Principal Core Faculty $192k

Similar Courses

Sorted by relevance