We may earn an affiliate commission when you visit our partners.
Pluralsight logo

IT Professional Fundamentals

Security

Glenn Weadock

Any aspiring computer technician must know how to implement security. This course will teach you all aspects of computer security, from physical and logical security concepts to the details of secure protocols, malware protection, and authentication.

Read more

Any aspiring computer technician must know how to implement security. This course will teach you all aspects of computer security, from physical and logical security concepts to the details of secure protocols, malware protection, and authentication.

Aspiring computer technicians must be able to implement security, one of the most important concerns of any IT organization. In this course, IT Professional Fundamentals: Security, you’ll learn the fundamentals of all aspects of computer security. First, you’ll discover elements of physical security such as locks, badges, smartcards, and hardware tokens. Then, you’ll learn about secure authentication, “least privilege” protection, permissions, and encryption, with a focus on wireless security and malware prevention, including social engineering attacks such as phishing. Finally, you'll see the laundry list of best practices for securing workstations, mobile devices, and SOHO routers. When you’re finished with this course, you'll be well prepared to implement strong security measures in your organization and prevent the most common security threats from damaging your organization’s systems, data, and people.

Enroll now

What's inside

Syllabus

Course Overview
Security Measures and Purposes
Wireless Protocols and Authentication
Malware Prevention
Read more
Social Engineering Threats and Vulnerabilities
Security Settings in Windows
Workstation Security Best Practices
Mobile and Embedded Device Security
Data Destruction and Disposal Methods
SOHO Network Security
Browser Security

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Covers physical and logical security concepts, including physical security elements like locks, badges, and smartcards
Provides a comprehensive understanding of encryption, authentication, and authorization techniques
Emphasizes the importance of wireless security and offers practical tips on preventing malware and phishing attacks
Includes best practices for securing workstations, mobile devices, and SOHO networks
Provides guidance on securing browsers and preventing online threats

Save this course

Save IT Professional Fundamentals: Security to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for IT Professional Fundamentals: Security. These are activities you can do either before, during, or after a course.

Career center

Learners who complete IT Professional Fundamentals: Security will develop knowledge and skills that may be useful to these careers:
Security Analyst
Security Analysts plan and implement security measures to protect an organization’s computer networks and systems. With attacks becoming more sophisticated, Security Analysts are in high demand. This course, IT Professional Fundamentals: Security, is an excellent foundation for aspiring Security Analysts. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering. By understanding these concepts, you’ll be well-equipped to enter this growing field and help protect organizations from cyber threats.
Information Security Manager
Information Security Managers plan and implement an organization’s security policies and procedures. They oversee the security of an organization’s computer networks, systems, and data. Information Security Managers are in high demand as organizations become increasingly aware of the importance of cybersecurity. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in information security. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Network Security Engineer
Network Security Engineers design, implement, and maintain security measures for computer networks. They are responsible for protecting networks from unauthorized access, Denial of Service attacks, and other threats. Network Security Engineers are in high demand as organizations become increasingly reliant on their networks. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in network security. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
IT Auditor
IT Auditors evaluate an organization’s IT systems and controls to ensure that they are aligned with the organization’s security policies and objectives. They also assess the organization’s compliance with regulatory requirements. IT Auditors are in high demand as organizations become increasingly aware of the importance of cybersecurity. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in information security. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. They assess an organization’s security risks and vulnerabilities, and recommend solutions to mitigate those risks. Security Consultants are in high demand as organizations become increasingly aware of the importance of cybersecurity. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in information security. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Incident Responder
Incident Responders are responsible for responding to and investigating security incidents. They analyze the incident, determine its scope and impact, and recommend solutions to mitigate the damage. Incident Responders are in high demand as organizations become increasingly reliant on their IT systems. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in incident response. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Penetration Tester
Penetration Testers attempt to exploit vulnerabilities in an organization’s computer networks and systems. They identify vulnerabilities and recommend solutions to mitigate those vulnerabilities. Penetration Testers are in high demand as organizations become increasingly aware of the importance of cybersecurity. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in penetration testing. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Cybersecurity Analyst
Cybersecurity Analysts monitor and analyze an organization’s security systems to identify and respond to security threats. They also investigate security incidents and recommend solutions to mitigate the damage. Cybersecurity Analysts are in high demand as organizations become increasingly reliant on their IT systems. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in cybersecurity analysis. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Security Architect
Security Architects design and implement security solutions for organizations. They work with stakeholders to identify security requirements and develop solutions that meet those requirements. Security Architects are in high demand as organizations become increasingly aware of the importance of cybersecurity. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in information security. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Security Engineer
Security Engineers design, implement, and maintain security solutions for organizations. They work with stakeholders to identify security requirements and develop solutions that meet those requirements. Security Engineers are in high demand as organizations become increasingly aware of the importance of cybersecurity. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in security engineering. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Information Security Analyst
Information Security Analysts monitor and analyze an organization’s security systems to identify and respond to security threats. They also investigate security incidents and recommend solutions to mitigate the damage. Information Security Analysts are in high demand as organizations become increasingly reliant on their IT systems. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in information security analysis. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Network Security Administrator
Network Security Administrators implement and maintain security solutions for computer networks. They work with stakeholders to identify security requirements and develop solutions that meet those requirements. Network Security Administrators are in high demand as organizations become increasingly reliant on their networks. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in network security administration. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Security Administrator
Security Administrators implement and maintain security solutions for organizations. They work with stakeholders to identify security requirements and develop solutions that meet those requirements. Security Administrators are in high demand as organizations become increasingly aware of the importance of cybersecurity. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in security administration. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Information Technology Specialist
Information Technology Specialists provide technical support to users of computer systems. They troubleshoot problems, install software, and maintain hardware. Information Technology Specialists are in high demand as organizations become increasingly reliant on their IT systems. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in information technology. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Computer Support Specialist
Computer Support Specialists provide technical support to users of computer systems. They troubleshoot problems, install software, and maintain hardware. Computer Support Specialists are in high demand as organizations become increasingly reliant on their IT systems. This course, IT Professional Fundamentals: Security, may be useful for Computer Support Specialists who want to learn more about security.

Reading list

We've selected 16 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in IT Professional Fundamentals: Security.
Comprehensive overview of computer security, covering both the principles and practices of the field. It commonly used textbook at academic institutions and provides a good foundation for understanding the concepts of computer security.
Provides a practical guide to building secure distributed systems. It covers topics such as threat modeling, security architecture, and security testing. It valuable resource for anyone who is interested in designing and implementing secure systems.
Provides an overview of computer security architecture.
Provides a comprehensive overview of cryptography and network security. It covers topics such as encryption, authentication, and network security protocols. It valuable resource for anyone who is interested in learning more about the technical aspects of computer security.
Provides a unique perspective on computer security by focusing on the human element. It covers topics such as social engineering, phishing, and identity theft. It valuable resource for anyone who is interested in understanding the human factors that contribute to security breaches.
Provides a practical guide to hacking techniques. It covers topics such as buffer overflows, SQL injection, and web application hacking. It valuable resource for anyone who is interested in learning more about the technical aspects of hacking.
Could be used as background reading to prepare for this course.
Provides a comprehensive overview of the CISSP certification. It covers topics such as security concepts, security threats, and security controls. It valuable resource for anyone who is interested in learning more about the CISSP certification.
Provides a comprehensive overview of the CompTIA Security+ certification. It covers topics such as security concepts, security threats, and security controls. It valuable resource for anyone who is interested in learning more about the CompTIA Security+ certification.
Provides a comprehensive overview of network security. It covers topics such as network security concepts, network security threats, and network security controls. It valuable resource for anyone who is interested in learning more about the basics of network security.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to IT Professional Fundamentals: Security.
The Complete Cyber Security Course : End Point Protection!
Most relevant
Microsoft 365 Security Management Fundamentals
Most relevant
Securing Applications with AWS
Most relevant
Secure Your Data at Rest
Most relevant
Microsoft 365 Administration: Managing Security Using...
Most relevant
Secure Software Lifecycle Management for CSSLP®
Most relevant
Windows 11 Troubleshooting: Virus and Malware
Most relevant
Wireshark Configuration for Cyber Security Analysis
Angular 4 Security Using JSON Web Tokens
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser