End User Security: IT Security Beginner

  • 3 Courses | 2h 11m 31s
  • 3 Books | 9h 51m
  • Includes Lab
Likes 30 Likes 30
 
Security is a primary concern for enterprises. Discover the basics of end user security, from methods, tools, and technologies.

GETTING STARTED

IT Security Fundamentals

  • Playable
    1. 
    Definition of IT Security
    2m 49s
    NOW PLAYING
  • Playable
    2. 
    Role of IT Security
    3m 9s
    UP NEXT

COURSES INCLUDED

IT Security Fundamentals
The best protected companies are those that know how to use computers, network, and mobile devices with security in mind. Explore fundamental security concepts that apply to use as an end user.
13 videos | 46m has Assessment available Badge
Using Corporate Devices Securely
Using corporate computers and devices in a secure way helps ensure you don't jeopardize your work, organization or personal security. Explore common threats to corporate computers, including malicious attacks, and best practices.
13 videos | 43m has Assessment available Badge
Secure Corporate Communications & Networking
Social networking offers countless opportunities but just as countless are the security threats posed by these advancements. Explore the common threats to corporate computers and devices that exploit vulnerabilities in communications.
12 videos | 41m has Assessment available Badge

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

BOOKS INCLUDED

Book

Information Technology Security Fundamentals
Assisting managers in understanding the role of IT Security in their enterprise, this book defines security from an organizational perspective, then builds upon that by discussing issues related to low-level technologies and higher level management issues like security policy.
Book Duration 2h 41m Book Authors By Bryan Hosack, Glen Sagers

Book

Social Engineering in IT Security: Tools, Tactics, and Techniques
Written by a global expert on the topic, this book discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results.
Book Duration 5h 55m Book Authors By Sharon Conheady

Book

100 Top Tips - Stay Safe Online and Protect Your Privacy in Easy Steps
Recognizing the threats you may encounter online is the first step to preventing them, and a good understanding of online security and privacy issues is essential to protecting yourself from them. Read this book to find out more.
Book Duration 1h 15m Book Authors By Nick Vandome

YOU MIGHT ALSO LIKE

Likes 0 Likes 0  
Likes 0 Likes 0  
Likes 12 Likes 12