End User Security: IT Security Beginner
- 3 Courses | 2h 11m 31s
- 3 Books | 9h 51m
- Includes Lab
Security is a primary concern for enterprises. Discover the basics of end user security, from methods, tools, and technologies.
GETTING STARTED
IT Security Fundamentals
-
1.Definition of IT Security2m 49sNOW PLAYING
-
2.Role of IT Security3m 9sUP NEXT
COURSES INCLUDED
IT Security Fundamentals
The best protected companies are those that know how to use computers, network, and mobile devices with security in mind. Explore fundamental security concepts that apply to use as an end user.
13 videos |
46m
Assessment
Badge
Using Corporate Devices Securely
Using corporate computers and devices in a secure way helps ensure you don't jeopardize your work, organization or personal security. Explore common threats to corporate computers, including malicious attacks, and best practices.
13 videos |
43m
Assessment
Badge
Secure Corporate Communications & Networking
Social networking offers countless opportunities but just as countless are the security threats posed by these advancements. Explore the common threats to corporate computers and devices that exploit vulnerabilities in communications.
12 videos |
41m
Assessment
Badge
EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.BOOKS INCLUDED
Book
Information Technology Security FundamentalsAssisting managers in understanding the role of IT Security in their enterprise, this book defines security from an organizational perspective, then builds upon that by discussing issues related to low-level technologies and higher level management issues like security policy.
2h 41m
By Bryan Hosack, Glen Sagers
Book
Social Engineering in IT Security: Tools, Tactics, and TechniquesWritten by a global expert on the topic, this book discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results.
5h 55m
By Sharon Conheady
Book
100 Top Tips - Stay Safe Online and Protect Your Privacy in Easy StepsRecognizing the threats you may encounter online is the first step to preventing them, and a good understanding of online security and privacy issues is essential to protecting yourself from them. Read this book to find out more.
1h 15m
By Nick Vandome