End User Security: IT Security Beginner

  • 3 Courses | 2h 29m 1s
  • 2 Books | 8h 36m
Likes 28 Likes 28
 
Security is a primary concern for enterprises. Discover the basics of end user security, from methods, tools, and technologies.

GETTING STARTED

IT Security Fundamentals

  • Playable
    1. 
    Definition of IT Security
    2m 49s
    NOW PLAYING
  • Playable
    2. 
    Role of IT Security
    3m 9s
    UP NEXT

COURSES INCLUDED

IT Security Fundamentals
The best protected companies are those that know how to use computers, network, and mobile devices with security in mind. Explore fundamental security concepts that apply to use as an end user.
13 videos | 52m
has Assessment available Badge
Using Corporate Devices Securely
Using corporate computers and devices in a secure way helps ensure you don't jeopardize your work, organization or personal security. Explore common threats to corporate computers, including malicious attacks, and best practices.
13 videos | 49m
has Assessment available Badge
Secure Corporate Communications & Networking
Social networking offers countless opportunities but just as countless are the security threats posed by these advancements. Explore the common threats to corporate computers and devices that exploit vulnerabilities in communications.
12 videos | 46m
has Assessment available Badge

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

BOOKS INCLUDED

Book

Information Technology Security Fundamentals
Assisting managers in understanding the role of IT Security in their enterprise, this book defines security from an organizational perspective, then builds upon that by discussing issues related to low-level technologies and higher level management issues like security policy.
Book Duration 2h 41m
Book Authors By Bryan Hosack, Glen Sagers

Book

Social Engineering in IT Security: Tools, Tactics, and Techniques
Written by a global expert on the topic, this book discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results.
Book Duration 5h 55m
Book Authors By Sharon Conheady

YOU MIGHT ALSO LIKE

Likes 0 Likes 0  
Likes 1 Likes 1  
Likes 22 Likes 22