Description: Hiring trustworthy and competent personnel is often overlooked when discussing IT security. Exploits take form not only as technical entities, but also as employee workplace violations. In this course, you'll also learn how to monitor and analyze various types of systems for audit and security purposes.
Target Audience: IT specialists who will be responsible for securing and analyzing IT assets at the hardware and software levels
Duration: 02:19
Description: Firewalls are one layer of defense against unauthorized access to networks and hosts. Intrusion detection and prevention can be used to increase security at both the host and network levels. In this course, you'll learn about these security mitigations as well as malware and how to use digital forensic tools.
Target Audience: IT specialists who will be responsible for securing and analyzing IT assets at the hardware and software levels
Duration: 02:11
Description: Authentication controls who gets access to resources. Stronger authentication means greater control over resource access. In this course, you will identify weaknesses including conducting vulnerability scans in order to protect IT assets.
Target Audience: IT specialists who will be responsible for securing and analyzing IT assets at the hardware and software levels
Duration: 02:26
Description: Applying security best practices to IT system creation and deployment can go a long way in reducing the attack surface. In this course, you will learn about the SDLC, penetration testing, how to mitigate threats, and the security frameworks on which these countermeasure are based.
Target Audience: IT specialists who will be responsible for securing and analyzing IT assets at the hardware and software levels
Duration: 02:10
Description: Assets must be identified before they can be protected. This can come from documentation or IT inventories. Proactive planning streamlines incident response to minimize negative impacts to the organization.
Target Audience: IT specialists who will be responsible for securing and analyzing IT assets at the hardware and software levels
Duration: 02:25
Description: IT security analysis builds upon a solid understanding of underlying network and cloud technologies. Existing IT system implementations must be understood before security controls can be recommended.
Target Audience: IT specialists who will be responsible for securing and analyzing IT assets at the hardware and software levels
Duration: 03:07