We may earn an affiliate commission when you visit our partners.
Glenn Weadock

Any aspiring computer technician must know how to implement security. This course will teach you all aspects of computer security, from physical and logical security concepts to the details of secure protocols, malware protection, and authentication.

Read more

Any aspiring computer technician must know how to implement security. This course will teach you all aspects of computer security, from physical and logical security concepts to the details of secure protocols, malware protection, and authentication.

Aspiring computer technicians must be able to implement security, one of the most important concerns of any IT organization. In this course, IT Professional Fundamentals: Security, you’ll learn the fundamentals of all aspects of computer security. First, you’ll discover elements of physical security such as locks, badges, smartcards, and hardware tokens. Then, you’ll learn about secure authentication, “least privilege” protection, permissions, and encryption, with a focus on wireless security and malware prevention, including social engineering attacks such as phishing. Finally, you'll see the laundry list of best practices for securing workstations, mobile devices, and SOHO routers. When you’re finished with this course, you'll be well prepared to implement strong security measures in your organization and prevent the most common security threats from damaging your organization’s systems, data, and people.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Security Measures and Purposes
Wireless Protocols and Authentication
Malware Prevention
Read more
Social Engineering Threats and Vulnerabilities
Security Settings in Windows
Workstation Security Best Practices
Mobile and Embedded Device Security
Data Destruction and Disposal Methods
SOHO Network Security
Browser Security

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Covers physical and logical security concepts, including physical security elements like locks, badges, and smartcards
Provides a comprehensive understanding of encryption, authentication, and authorization techniques
Emphasizes the importance of wireless security and offers practical tips on preventing malware and phishing attacks
Includes best practices for securing workstations, mobile devices, and SOHO networks
Provides guidance on securing browsers and preventing online threats

Save this course

Save IT Professional Fundamentals: Security to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in IT Professional Fundamentals: Security with these activities:
Review physical security concepts
Reinforce foundational knowledge by reviewing fundamental concepts to help strengthen understanding as the course progresses.
Browse courses on Physical Security
Show steps
  • Review and understand key principles of physical security
  • Identify different types of physical security measures
  • Explore best practices for implementing physical security controls
Discussion group on social engineering attacks
Engage in peer discussions to gain diverse perspectives and insights on social engineering techniques, enhancing understanding of this critical security threat.
Browse courses on Social Engineering
Show steps
  • Join or create a study group focused on social engineering
  • Discuss different types of social engineering attacks
  • Share experiences and best practices for preventing and mitigating social engineering threats
Join a Study Group to Review Security Concepts
Collaborate with peers and reinforce your understanding of security concepts through discussions and problem-solving.
Browse courses on Security Concepts
Show steps
  • Find or create a study group focused on computer security
  • Participate in regular meetings and discussions
  • Collaborate on security-related projects or assignments
Ten other activities
Expand to see all activities and additional details
Show all 13 activities
Identify Security Threats in Real-World Scenarios
Practice identifying and mitigating real-world security threats to solidify your understanding of security principles.
Browse courses on Physical Security
Show steps
  • Read about common security threats and vulnerabilities
  • Analyze real-world security breach case studies
  • Conduct simulated security assessments and provide recommendations
Follow a Tutorial on Securing Windows Desktops and Laptops
Enhance your understanding of Windows security by following a guided tutorial on protecting desktops and laptops.
Browse courses on Windows
Show steps
  • Find a reputable tutorial on Windows security
  • Follow the tutorial steps and implement the security measures on your Windows device
  • Test the effectiveness of the security measures
Walkthrough of wireless authentication protocols
Supplement course material by seeking online guidance to further solidify understanding of authentication in wireless networks.
Browse courses on Wireless Security
Show steps
  • Locate resources and tutorials on wireless security and authentication protocols
  • Follow step-by-step walkthroughs to enhance comprehension
Write a Blog Post on Best Practices for Wireless Network Security
Share your knowledge and reinforce your understanding of wireless network security by writing a blog post.
Show steps
  • Research and gather information on wireless network security best practices
  • Organize and write the blog post
  • Publish and promote your blog post
Create a Security Plan for a Small Business
Develop a comprehensive security plan to protect a small business's data and infrastructure.
Browse courses on Security Measures
Show steps
  • Gather requirements and assess risks
  • Design and implement security controls
  • Document and communicate the security plan
Security checklist for mobile devices
Reinforce knowledge of mobile security risks and mitigation strategies by creating a comprehensive checklist for securing personal devices.
Browse courses on Mobile Device Security
Show steps
  • Identify common security threats to mobile devices
  • Research and compile best practices for mobile device security
  • Create a detailed checklist outlining measures to protect mobile devices
Malware analysis exercises
Sharpen skills by performing hands-on malware dissection to hone detection and mitigation capabilities.
Browse courses on Malware Prevention
Show steps
  • Practice analyzing malware samples using online resources or tools
  • Identify techniques used by malware to evade detection
  • Experiment with different malware detection and removal strategies
Participate in cybersecurity awareness events
Gain practical experience and contribute to the community by volunteering at cybersecurity awareness events, promoting security literacy.
Browse courses on Cybersecurity Awareness
Show steps
  • Identify local cybersecurity awareness events
  • Volunteer time to assist with event planning or execution
  • Engage with attendees to share knowledge and promote security practices
Design and implement security measures for a home network
Gain practical experience by designing and configuring a secure home network, applying the principles learned throughout the course.
Browse courses on network security
Show steps
  • Research and select appropriate security hardware and software for the home network
  • Design a detailed network security plan
  • Implement the security plan and configure security settings
  • Test and evaluate the effectiveness of the implemented security measures
Attend a workshop on wireless network security
Deepen understanding and expand skills in wireless network security by attending a dedicated workshop with expert instructors.
Browse courses on Wireless Network Security
Show steps
  • Research and identify relevant wireless network security workshops
  • Register and attend the workshop
  • Actively participate in hands-on exercises and discussions

Career center

Learners who complete IT Professional Fundamentals: Security will develop knowledge and skills that may be useful to these careers:
Security Analyst
Security Analysts plan and implement security measures to protect an organization’s computer networks and systems. With attacks becoming more sophisticated, Security Analysts are in high demand. This course, IT Professional Fundamentals: Security, is an excellent foundation for aspiring Security Analysts. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering. By understanding these concepts, you’ll be well-equipped to enter this growing field and help protect organizations from cyber threats.
Information Security Manager
Information Security Managers plan and implement an organization’s security policies and procedures. They oversee the security of an organization’s computer networks, systems, and data. Information Security Managers are in high demand as organizations become increasingly aware of the importance of cybersecurity. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in information security. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Network Security Engineer
Network Security Engineers design, implement, and maintain security measures for computer networks. They are responsible for protecting networks from unauthorized access, Denial of Service attacks, and other threats. Network Security Engineers are in high demand as organizations become increasingly reliant on their networks. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in network security. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
IT Auditor
IT Auditors evaluate an organization’s IT systems and controls to ensure that they are aligned with the organization’s security policies and objectives. They also assess the organization’s compliance with regulatory requirements. IT Auditors are in high demand as organizations become increasingly aware of the importance of cybersecurity. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in information security. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. They assess an organization’s security risks and vulnerabilities, and recommend solutions to mitigate those risks. Security Consultants are in high demand as organizations become increasingly aware of the importance of cybersecurity. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in information security. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Incident Responder
Incident Responders are responsible for responding to and investigating security incidents. They analyze the incident, determine its scope and impact, and recommend solutions to mitigate the damage. Incident Responders are in high demand as organizations become increasingly reliant on their IT systems. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in incident response. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Penetration Tester
Penetration Testers attempt to exploit vulnerabilities in an organization’s computer networks and systems. They identify vulnerabilities and recommend solutions to mitigate those vulnerabilities. Penetration Testers are in high demand as organizations become increasingly aware of the importance of cybersecurity. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in penetration testing. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Cybersecurity Analyst
Cybersecurity Analysts monitor and analyze an organization’s security systems to identify and respond to security threats. They also investigate security incidents and recommend solutions to mitigate the damage. Cybersecurity Analysts are in high demand as organizations become increasingly reliant on their IT systems. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in cybersecurity analysis. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Security Architect
Security Architects design and implement security solutions for organizations. They work with stakeholders to identify security requirements and develop solutions that meet those requirements. Security Architects are in high demand as organizations become increasingly aware of the importance of cybersecurity. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in information security. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Security Engineer
Security Engineers design, implement, and maintain security solutions for organizations. They work with stakeholders to identify security requirements and develop solutions that meet those requirements. Security Engineers are in high demand as organizations become increasingly aware of the importance of cybersecurity. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in security engineering. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Information Security Analyst
Information Security Analysts monitor and analyze an organization’s security systems to identify and respond to security threats. They also investigate security incidents and recommend solutions to mitigate the damage. Information Security Analysts are in high demand as organizations become increasingly reliant on their IT systems. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in information security analysis. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Network Security Administrator
Network Security Administrators implement and maintain security solutions for computer networks. They work with stakeholders to identify security requirements and develop solutions that meet those requirements. Network Security Administrators are in high demand as organizations become increasingly reliant on their networks. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in network security administration. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Security Administrator
Security Administrators implement and maintain security solutions for organizations. They work with stakeholders to identify security requirements and develop solutions that meet those requirements. Security Administrators are in high demand as organizations become increasingly aware of the importance of cybersecurity. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in security administration. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Information Technology Specialist
Information Technology Specialists provide technical support to users of computer systems. They troubleshoot problems, install software, and maintain hardware. Information Technology Specialists are in high demand as organizations become increasingly reliant on their IT systems. This course, IT Professional Fundamentals: Security, can help you build a solid foundation in information technology. It covers a wide range of topics, including physical security, authentication, encryption, malware prevention, and social engineering.
Computer Support Specialist
Computer Support Specialists provide technical support to users of computer systems. They troubleshoot problems, install software, and maintain hardware. Computer Support Specialists are in high demand as organizations become increasingly reliant on their IT systems. This course, IT Professional Fundamentals: Security, may be useful for Computer Support Specialists who want to learn more about security.

Reading list

We've selected 16 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in IT Professional Fundamentals: Security.
Comprehensive overview of computer security, covering both the principles and practices of the field. It commonly used textbook at academic institutions and provides a good foundation for understanding the concepts of computer security.
Provides a practical guide to building secure distributed systems. It covers topics such as threat modeling, security architecture, and security testing. It valuable resource for anyone who is interested in designing and implementing secure systems.
Provides an overview of computer security architecture.
Provides a comprehensive overview of cryptography and network security. It covers topics such as encryption, authentication, and network security protocols. It valuable resource for anyone who is interested in learning more about the technical aspects of computer security.
Provides a unique perspective on computer security by focusing on the human element. It covers topics such as social engineering, phishing, and identity theft. It valuable resource for anyone who is interested in understanding the human factors that contribute to security breaches.
Provides a practical guide to hacking techniques. It covers topics such as buffer overflows, SQL injection, and web application hacking. It valuable resource for anyone who is interested in learning more about the technical aspects of hacking.
Could be used as background reading to prepare for this course.
Provides a comprehensive overview of the CISSP certification. It covers topics such as security concepts, security threats, and security controls. It valuable resource for anyone who is interested in learning more about the CISSP certification.
Provides a comprehensive overview of the CompTIA Security+ certification. It covers topics such as security concepts, security threats, and security controls. It valuable resource for anyone who is interested in learning more about the CompTIA Security+ certification.
Provides a comprehensive overview of network security. It covers topics such as network security concepts, network security threats, and network security controls. It valuable resource for anyone who is interested in learning more about the basics of network security.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to IT Professional Fundamentals: Security.
The Complete Cyber Security Course : End Point Protection!
Most relevant
Microsoft 365 Security Management Fundamentals
Most relevant
Securing Applications with AWS
Most relevant
Secure Your Data at Rest
Most relevant
Microsoft 365 Administration: Managing Security Using...
Most relevant
Secure Software Lifecycle Management for CSSLP®
Most relevant
Windows 11 Troubleshooting: Virus and Malware
Most relevant
Wireshark Configuration for Cyber Security Analysis
Angular 4 Security Using JSON Web Tokens
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser