Security Trends: Beginner

  • 2 Courses | 2h 15m 41s
  • 7 Books | 32h 48m
Likes 39 Likes 39
 
Security is essential to network and system administrators, and for organizations as a whole. Explore the aspects of security trends in detail.

GETTING STARTED

Attack Vectors & Mitigations

  • Playable
    1. 
    Mobile Devices and Malware
    5m 36s
    NOW PLAYING
  • Playable
    2. 
    BYOD And Business
    3m 27s
    UP NEXT

COURSES INCLUDED

Attack Vectors & Mitigations
Cyber insurance is becoming more common as companies seek to protect their IT systems. During this course, you will explore potential security breach sources such as mobile and IoT devices. Topics include the pros and cons of workplace Bring Your Own Device (BYOD) policies; the risks of outsourcing your IT; how internet-connected devices, including wearable gadgets, may present security risks. You will also discover how Transport Layer Security (TLS) plays a key role, and learn how to protect stored data with encryption, such as BitLocker. As you progress through the course, you will explore how insecure databases can leak data; and learn how to evaluate cloud data security options, Data Loss Prevention (DLP), Multi-factor Authentication (MFA), cloud MFA, Single Sign-On (SSO), Identity Federation, and cyber insurance. You will conclude by listing common sources of security breaches and how to protect against them.
16 videos | 1h 19m has Assessment available Badge
Vulnerabilities and Exploits
Discover how common threat sources actually get exploited, in the world of web security. During this course, you will learn about white hat hackers, social engineers, phishing, social engineering attempts, exploit kits, ransomware, state sponsored hacking, and bug bounties. See how web-based applications have become more popular and what popularity means for data security. Look at Web Application Firewalls (WAFs), and how they protect web applications. Identify disaster recovery terms, such as BCP, DRP, RTO, and RPO. As a review exercise, you will describe how malicious users use tools to exploit vulnerabilities.
12 videos | 56m has Assessment available Badge

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

BOOKS INCLUDED

Book

Cybersecurity Guidance for Small and Medium-Sized Enterprises
Addressing the SME scenario and its typical resources, budget and technical-skills limitations, this sample content offers SMEs a practical and manageable tool for planning, implementing and maintaining good cybersecurity at affordable cost.
Book Duration 7m Book Authors By ISACA

Book

The Complete Guide to Cybersecurity Risks and Controls
Presenting the fundamental concepts of information and communication technology (ICT) governance and control, this book, shows you how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data.
Book Duration 6h 24m Book Authors By Anne Kohnke, Dan Shoemaker, Ken Sigler

Book

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions
A comprehensive and authoritative look at the critical topic of cybersecurity from start to finish, this essential book addresses cybersecurity strategies that include identity management, risk management, and incident management.
Book Duration 5h 44m Book Authors By Thomas J. Mowbray

Book

CompTIA Cybersecurity Analyst (CSA+) Study Guide: Exam CS0-001
Helping you focus on your review for the CSA+, this guide provides real-world examples drawn from experts, hands-on labs, insight on how to create your own cybersecurity toolkit, and end-of-chapter review questions to help you gauge your understanding each step of the way.
Book Duration 8h 44m Book Authors By David Seidl, Mike Chapple

Book

The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities
Offering step-by-step instruction for building, measuring, and optimizing cybersecurity capabilities, this book provides authoritative guidance for real-world situations, and cross-functional solutions for enterprise-wide improvement.
Book Duration 6h 46m Book Authors By Domenic Antonucci

Book

Cryptography and Network Security: A Practical Approach
Network security is a set of protocols that allows us to use the internet comfortably without worrying about security attacks, and the most common tool for providing network security is cryptography. This book provides a practical survey of the principles of cryptography and network security.
Book Duration 3h 55m Book Authors By K. Haribaskar

Book

Network Hardening: An Automated Approach to Improving Network Security
Examining the tools based on attack graphs that help reveal network hardening threats, this book provides an improved technique that considers the dependencies between hardening options and employs a near-optimal approximation algorithm to scale linearly with the size of the inputs.
Book Duration 1h 8m Book Authors By Lingyu Wang, Massimiliano Albanese, Sushil Jajodia
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

CHANNEL Cisco Security
Likes 117 Likes 117  
Likes 40 Likes 40