End User Security: IT Security beginner

  • 2 Courses | 1h 30m 18s
  • 8 Books | 31h 11m
  • Includes Lab
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
 
Security is a primary concern for enterprises. Discover the basics of end user security, from methods, tools, and technologies.

GETTING STARTED

An Executive's Guide to Security: Understanding Security Threats

  • 1m 9s
  • 4m 21s

COURSES INCLUDED

An Executive's Guide to Security: Understanding Security Threats
Companies that do not understand threats facing their information are at risk of costly data breaches. In this 13-video course, learners can explore common security threats, types of network attacks, and the human element of security threats. Key concepts covered here include what an attack surface is, and how it must be understood to protect corporate information; and what network hardening is and how it relates to protection of corporate information. Next, learners will examine network demilitarized zones and how they protect corporate information; observe differences between threats, vulnerabilities, and risks in corporate environments; and study top kinds of security threats facing organizations today. Continue by learning the role that physical security plays in protecting corporate data; how social engineering is conducted and how it is mitigated through corporate policy; and the importance of corporate security policies, and why they should be strictly adhered to. Finally, explore the importance of password policies and why they should be adhered to; and learn reasons why IT administrators need to protect an organization by refusing to bend rules.
13 videos | 44m has Assessment available Badge
An Executive's Guide to Security: Protecting Your Information
This 13-video course explores data protection for businesses, including devices, social media, and good governance through security principles, policies, and programs. You will examine several types of security threats, the different types of network attacks, the role physical security plays in the protection of corporate data, and the human element of security threats. Next, learners examine the attack surface, including the total combined nodes, users, devices, and any entry points of software, a network, and a business environment. You will examine threats, vulnerabilities, and risks, and learn the importance of network hardening. This course uses real-world examples of several top security threats to businesses today, including malware, social engineering, unpatched software, BYOD (bring your own device), and IoT (Internet of things). You will examine clickjacking and URL spoofing. Finally, this course discusses the legal and financial ramifications of a major security breach, the importance of having a security policy, training personnel, password protection, and managing a company's security.
13 videos | 45m has Assessment available Badge

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

BOOKS INCLUDED

Book

Information Technology Security Fundamentals
Assisting managers in understanding the role of IT Security in their enterprise, this book defines security from an organizational perspective, then builds upon that by discussing issues related to low-level technologies and higher level management issues like security policy.
book Duration 2h 41m book Authors By Bryan Hosack, Glen Sagers

Book

Social Engineering in IT Security: Tools, Tactics, and Techniques
Written by a global expert on the topic, this book discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results.
book Duration 5h 55m book Authors By Sharon Conheady

Book

100 Top Tips - Stay Safe Online and Protect Your Privacy in Easy Steps
Recognizing the threats you may encounter online is the first step to preventing them, and a good understanding of online security and privacy issues is essential to protecting yourself from them. Read this book to find out more.
book Duration 1h 15m book Authors By Nick Vandome

Book

Cyber Safety for Everyone 2nd Edition
Book is a step-by-step guide that handholds you through all the essential aspects of internet safety. The content is presented in a simple and easy-to-understand manner. True incidents, practical tips, survey results, conversation starters and teaching ideas given in the book, make the reading experience truly enriching.
book Duration 2h 56m book Authors By Jaago Teens

Book

The Smart Girl's Guide to Privacy: Practical Tips for Staying Safe Online
Helping you cut through the confusion and start protecting your online life, this book offers practical, user-friendly advice and shows you how women are targeted online and how to keep yourself safe.
book Duration 2h 14m book Authors By Violet Blue

Book

Cybercrime: Protecting Your Business, Your Family and Yourself
This book aims to prepare you to defend yourself against the tactics cybercriminals use, and gives you advice on what you can do if you, or your business, does fall victim to cybercrime.
book Duration 3h 36m book Authors By Todd Wade

Book

The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy
Providing the most straightforward and up-to-date guide to cyber safety for anyone who ventures online for work, school, or personal use, this book includes real world examples that demonstrate how cyber criminals commit their crimes, and what users can do to keep their data safe.
book Duration 5h 42m book Authors By John Sammons, Michael Cross

Book

Cybersecurity For Dummies, 2nd Edition
Cybersecurity For Dummies is the ideal handbook for anyone considering a career transition into cybersecurity, as well as anyone seeking to secure sensitive information.
book Duration 6h 52m book Authors By Joseph Steinberg
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)