Aspire Journeys

Beginner to Cyber Foundational

  • 55 Courses | 49h 53m 59s
  • 9 Labs | 36h 10m
Likes 7 Likes 7
Gain the necessary skills to begin a cybersecurity profession. From gaining a foundation of networking and programming to learning current threat trends and techniques needed to protect your network, this journey will provide the tools needed to prepare you for a successful career in cybersecurity. This journey includes: On-demand content, Instructor-led training, labs, challenges, live mentoring, and additional books/resources.

Networking Fundamentals

In this track of the Beginner to Cyber Foundational journey, the focus will be on Building a foundation of networking knowledge in a real-world, multi-vendor environment. You will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.

This track includes instructor-led training, on-demand content, practice labs, and challenges.

  • 6 Courses | 5h 40m 20s
  • 2 Labs | 7h 20m

Networking Fundamentals On Demand

In this track of the Beginner to Cyber Foundational journey, the focus will be on Building a foundation of networking knowledge in a real-world, multi-vendor environment. You will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.

This track includes on-demand content, practice labs, and challenges.

  • 17 Courses | 14h 4m 32s
  • 2 Labs | 7h 20m

Programming Fundamentals On Demand

In this track of the Beginner to Cyber Foundational journey journey, the focus will be on programming fundamentals where one can learn to build program logic with pseudocode, the purpose of the algorithm, Object-oriented concepts, and the best programming practices.

This track includes on-demand content and a practice lab.

  • 6 Courses | 4h 51m 24s
  • 1 Lab

Cybersecurity Foundations

In this track of the Beginner to Cyber Foundational journey journey, the focus will be on Investigate cybersecurity threats and master techniques needed to protect your network. You will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls.

This track includes instructor-led training, on-demand content, practice labs, and challenges.

  • 6 Courses | 5h 47m 54s
  • 2 Labs | 20h 30m

Cybersecurity Foundations On Demand

In this track of the Beginner to Cyber Foundational journey journey, the focus will be on Investigate cybersecurity threats and master techniques needed to protect your network. You will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls.

This track includes on-demand content, practice labs, and challenges.

  • 20 Courses | 19h 29m 49s
  • 2 Labs | 1h

COURSES INCLUDED

Introduction to Networking
The fundamental components and concepts that comprise networking represent a collection of technology and resources used to deliver a single web page or fuel an entire enterprise. In this course, you'll explore the fundamentals of networking technology, beginning with the building blocks of networking, the various devices that can be connected to networks, and the basics of network infrastructure. You'll go onto discover the role of media in networking, the purpose of switches, access points, and routers, network services, types, and topologies. Finally, you'll learn about peer-to-peer and client-server networking, virtual computing, and cloud computing. This course was originally created by Global Knowledge (GK).
18 videos | 40m has Assessment available Badge
Networking Standards and Connections
Networking standards define how communication occurs during transmission and between devices. When you want devices to communicate with each other, you need to be able to connect them, and there's a variety of ways to do that. In this course, you'll explore the fundamentals of networking standards, beginning with the organizations that create and maintain them and the process surrounding networking standards creation. Then you'll explore the OSI model and its various layers and discover the backbone of computer networking, the TCP/IP model. You'll discover the various networking media types, cables, standards, and categories. Then you'll explore half and full duplex communication and structured cabling systems and how to design and install them. Then you'll learn how to properly examine and test cabling. Finally, you'll delve into fiber optic cabling and wireless network connections. This course was originally created by Global Knowledge (GK).
38 videos | 1h 20m has Assessment available Badge
Ethernet LANs and Switching
The predominant technology that fuels network connections is Ethernet. Switching is the process of sending networking signals to the right destination. In this course you'll learn about the history of Ethernet, NIC and MAC addresses, and unicast, multicast, and broadcast addresses. Then you'll explore Ethernet standards and Ethernet frame structures, as well as Ethernet equipment. You'll learn about Ethernet connectors and performance issues associated with Ethernet communication. You'll learn about Ethernet switches and the benefits of switching. Then you'll explore switch functionality, connectivity issues surrounding switching, and spanning tree protocol. You'll go onto discover how to configure switches and the importance of port security. Finally, you'll learn about Power Over Ethernet (POE), port mirroring, and Virtual LANs (VLANs). This course was originally created by Global Knowledge (GK).
38 videos | 1h 5m has Assessment available Badge
IP Addressing and IPv4 Subnetting
Internet Protocol (IP) is the backbone of internet communication. Subnetting is the process of dividing a network into subnetworks and it's an important part of designing computer networks. In this course, you'll discover IP addressing concepts such as addressing, binary numbering, and dotted decimal notation. Then you'll explore classful addressing, reserved and private addresses, and network masks. You'll learn about classless addressing and the new format for IP addresses, IPv6. You'll explore subnetting and its purpose and subnet mask rules. Then you'll discover the art and the science of subnetting and how to calculate subnets. Finally, you'll learn about key subnet addresses and how to implement a subnet plan. This course was originally created by Global Knowledge (GK).
23 videos | 53m has Assessment available Badge
TCP/IP Security and IPv6
Any discussion of networking would not be complete without addressing information security. The TCP/IP protocols were not originally designed with security in mind. In this course, you'll explore common vulnerabilities at each layer of the TCP/IP module and common mitigations for those security weaknesses. You'll learn the components of the CIA triad, as well as some vulnerabilities and attacks at each of the four layers of the TCP/IP model. Next, you'll examine the network access layer security protocols, the components of IPsec, and the phases of an IPsec session. You'll learn about the role of virtual private networking in providing TCP/IP security. Finally, you'll explore how Transport Layer Security, Domain Name System Security Extensions, and Secure Shell Protocol are involved in TCP/IP security. Internet Protocol version 4 is now more than 30 years old. Among other consequences of its advancing age, the public Internet has depleted the available addresses that can be assigned. While several efforts have been developed to address this problem, the true solution is in the implementation of Internet Protocol version 6. In this course, you'll also explore the three categories of IPv6 address and their format and structure. You'll learn the process of mapping an IEEE MAC address into a 64-bit EUI format for IPv6 address. You'll also examine the types of IPv6 address, the characteristics of the IPv6 header, and the common types of ICMPv6 messages. Finally, you'll learn to describe changes to the DNS records with IPv6 and about modifications to common routing protocols used with IPv6. This course was originally created by Global Knowledge (GK).
25 videos | 52m has Assessment available Badge
Network Security and Emerging Technologies
Computer networking is an indispensable tool for single users and large enterprises alike, but unfortunately there are those who want to steal your information or profit off of you. Also, technology changes faster than most of us can keep up with it. In this course, you'll discover the elements of securing networks against attackers, including common security threats, malware, and social engineering. Then you'll learn about the risks of unsecured networks and how attackers compromise networks. You'll explore threat mitigation techniques, types of network security software, VPNs, perimeter networks, intrusion detection systems, security training, and information security planning. You'll learn about emerging technologies, including new wireless technologies and enterprise mobility. Then you'll explore the Internet of Things (IoT) and software defined networks. Finally, you'll discover the importance of keeping up with new technologies and methods for staying current. This course was originally created by Global Knowledge (GK).
22 videos | 47m has Assessment available Badge

COURSES INCLUDED

Introduction to Networking
The fundamental components and concepts that comprise networking represent a collection of technology and resources used to deliver a single web page or fuel an entire enterprise. In this course, you'll explore the fundamentals of networking technology, beginning with the building blocks of networking, the various devices that can be connected to networks, and the basics of network infrastructure. You'll go onto discover the role of media in networking, the purpose of switches, access points, and routers, network services, types, and topologies. Finally, you'll learn about peer-to-peer and client-server networking, virtual computing, and cloud computing. This course was originally created by Global Knowledge (GK).
18 videos | 40m has Assessment available Badge
Networking Standards and Connections
Networking standards define how communication occurs during transmission and between devices. When you want devices to communicate with each other, you need to be able to connect them, and there's a variety of ways to do that. In this course, you'll explore the fundamentals of networking standards, beginning with the organizations that create and maintain them and the process surrounding networking standards creation. Then you'll explore the OSI model and its various layers and discover the backbone of computer networking, the TCP/IP model. You'll discover the various networking media types, cables, standards, and categories. Then you'll explore half and full duplex communication and structured cabling systems and how to design and install them. Then you'll learn how to properly examine and test cabling. Finally, you'll delve into fiber optic cabling and wireless network connections. This course was originally created by Global Knowledge (GK).
38 videos | 1h 20m has Assessment available Badge
Ethernet LANs and Switching
The predominant technology that fuels network connections is Ethernet. Switching is the process of sending networking signals to the right destination. In this course you'll learn about the history of Ethernet, NIC and MAC addresses, and unicast, multicast, and broadcast addresses. Then you'll explore Ethernet standards and Ethernet frame structures, as well as Ethernet equipment. You'll learn about Ethernet connectors and performance issues associated with Ethernet communication. You'll learn about Ethernet switches and the benefits of switching. Then you'll explore switch functionality, connectivity issues surrounding switching, and spanning tree protocol. You'll go onto discover how to configure switches and the importance of port security. Finally, you'll learn about Power Over Ethernet (POE), port mirroring, and Virtual LANs (VLANs). This course was originally created by Global Knowledge (GK).
38 videos | 1h 5m has Assessment available Badge
Wireless LANs
When computer networking technology effectively cut the cord, a new era of computer communication emerged. In this course, you'll explore wireless technology including the standards and organizations that govern wireless networking. Then you'll discover Wi-Fi concepts such as access points, WLAN controllers, SSIDs, and Wi-Fi channels. Finally, you'll learn about wireless tools, security, authentication, encryption, and performance. This course was originally created by Global Knowledge (GK).
16 videos | 34m has Assessment available Badge
IP Addressing and IPv4 Subnetting
Internet Protocol (IP) is the backbone of internet communication. Subnetting is the process of dividing a network into subnetworks and it's an important part of designing computer networks. In this course, you'll discover IP addressing concepts such as addressing, binary numbering, and dotted decimal notation. Then you'll explore classful addressing, reserved and private addresses, and network masks. You'll learn about classless addressing and the new format for IP addresses, IPv6. You'll explore subnetting and its purpose and subnet mask rules. Then you'll discover the art and the science of subnetting and how to calculate subnets. Finally, you'll learn about key subnet addresses and how to implement a subnet plan. This course was originally created by Global Knowledge (GK).
23 videos | 53m has Assessment available Badge
TCP, UDP, Support and Management Protocols
Transmission Control Protocol/Internet Protocol (TCP/IP) is the underlying communication mechanism of all networked devices. A number of protocols perform specific functions when facilitating network communication. In this course, you'll learn about TCP and User Datagram Protocol and connection-oriented vs. connectionless protocols. Then you'll learn how messages are packaged and source and destination port numbers. You'll learn about Network Address Translation. You'll learn about Address Resolution Protocol, ARP messages, and the ARP cache. Then you'll explore Dynamic Host Configuration Protocol, the Domain Name System, Internet Control Message Protocol, ICMP and the Ping command, and Internet Group Management Protocol. Finally, you'll learn about telnet, Simple Network Management Protocol, and legacy protocols. This course was originally created by Global Knowledge (GK).
29 videos | 59m has Assessment available Badge
Routing and Wide Area Networks
Routers play a crucial role in computer networking. Networking technologies have made it possible to implement connectivity over broad geographical areas. In this course, you'll discover the inner workings of routers including logical segmentation, static and dynamic routing and the ways routers make decisions. Then you'll learn about routing metrics and tables. You'll explore the various routing protocols and how basic router configuration is performed. You'll then explore Wide Area Networks (WANs) and their related technologies including WAN providers, circuit-switched and packet-switched networks, and SONET. Then you'll discover Multiprotocol Label Switching (MPLS) and Carrier Ethernet networks. Finally, you'll learn about cloud-based networks and how they can provide connectivity over the internet. This course was originally created by Global Knowledge (GK).
31 videos | 55m has Assessment available Badge
Communication and Web Protocols
In networking, communications are facilitated using a number of communication protocols. In this course you'll explore the various protocols used for transmitting information including email protocols SMTP, POP3, and IMAP. Then you'll learn about instant messaging and the SIMPLE and XMPP protocols. You'll discover VoIP, SIP, RTP, H.323 and MGCP, and unified communications. There are several protocols used to facilitate communication on the Worldwide Web. So, you'll explore HTTP and URLs. Then you'll learn about SSL and TLS. Finally, you'll discover RDP and FTP. This course was originally created by Global Knowledge (GK).
18 videos | 28m has Assessment available Badge
Network Security and Emerging Technologies
Computer networking is an indispensable tool for single users and large enterprises alike, but unfortunately there are those who want to steal your information or profit off of you. Also, technology changes faster than most of us can keep up with it. In this course, you'll discover the elements of securing networks against attackers, including common security threats, malware, and social engineering. Then you'll learn about the risks of unsecured networks and how attackers compromise networks. You'll explore threat mitigation techniques, types of network security software, VPNs, perimeter networks, intrusion detection systems, security training, and information security planning. You'll learn about emerging technologies, including new wireless technologies and enterprise mobility. Then you'll explore the Internet of Things (IoT) and software defined networks. Finally, you'll discover the importance of keeping up with new technologies and methods for staying current. This course was originally created by Global Knowledge (GK).
22 videos | 47m has Assessment available Badge
Getting Started with TCP/IP and Numbering Systems
TCP/IP is the globally accepted group of protocols at the core of the Internet and organizational intranets. In this course, you'll start at the beginning and learn about the origins of the protocols that underpin the Internet and enterprise networks. You'll explore each of the layers of the TCP/IP networking model, as well as the concept of peer protocols. You'll also examine the standardization process that is overseen by the Internet Engineering Task Force. Finally, you'll learn about the types of requests for comments that are used by this task force. Depending upon the type of information you have and who is using it, information is stored, transmitted, and displayed in different ways. As a result, different numbering systems are used to represent that information. Understanding these number systems, which can be binary, decimal, or hexadecimal, is an important skill for those who interpret and troubleshoot network systems. In this course, you'll also learn about the four numbering systems used by data systems. You'll also explore positional number system representations, how values are represented using numbering systems, and how to convert values between them. Finally, you'll learn different methods for determining the base of a value when the base is unknown. This course was originally created by Global Knowledge (GK).
20 videos | 38m has Assessment available Badge
Ethernet, Network Access, and IPv4 Addressing
Technically, the network interface layer of the TCP/IP model is not described in the family of protocols. But an IP packet cannot travel between devices without using physical media and protocols to access that media. In this course, you'll review how to identify physical layer connectivity options. You'll learn three types of MAC addresses and how to identify different Ethernet frame formats and modifications. You'll also explore the header fields of Ethernet and how they are used, as well as modifications of the Ethernet frame format. Finally, you'll learn about the use of protocol analyzers. In order for internetworking to work, there has to be a way to distinguish which network a device belongs to. This is accomplished with a form of addressing called logical addressing, which is presented by an IP address. In this course, you'll also learn the evolution of IP addressing from classical addressing through class-less addressing. You'll examine how network masking operates. Finally, you'll explore network address translation and the value of variable length subnet masking. This course was originally created by Global Knowledge (GK).
27 videos | 47m has Assessment available Badge
VLSM, ARP, and Multicasting
Subnetting is the practice of dividing a given block of addresses into sub-units. This is done to meet organizational, security, and performance needs. In this course, you'll learn the differences between fixed-length subnet masks and variable-length subnet masks. You'll explore how subnet values are calculated and how to use VLSM to subnet a given block address. Finally, you'll learn how VLSM relates to Classless Inter-Domain routing. Address Resolution Protocol is a fundamental protocol that maps an IP address to a target MAC address. In this course, you'll also learn the purpose of address mapping, the characteristics of the ARP cache, and ARP commands. In addition, you'll learn about each of the fields in an ARP message and other ARP capabilities. While the majority of network communications gets done using a one-to-one transmission, some forms of communication are better served using a one-to-man transmission, like a television broadcast. The Internet Protocol supports this one-to-many type of communication with the Internet Group Management Protocol. You'll learn about the uses of multicasting and its main characteristics. You'll also explore the role of IGMP in multicasting and how multicast routing works. This course was originally created by Global Knowledge (GK).
29 videos | 51m has Assessment available Badge
IPv4 and IP Routing
The Internet Protocol is one of the key protocols in TCP/IP networking. In fact, it's so important that it forms the IP in TCP/IP. In this course, you'll learn key facts about IP and IP networks. You'll explore the various fields of the IPv4 header and their uses. You'll also learn about IP fragmentation, IP options, and the layout of the options field. Logical or IP addressing provides for the identification of the network to which a device belong. The transmission of those packets, from one network to another, is controlled by routers. Routing is accomplished with routing protocols that define how routers make decisions and how they communication with one another. In this course, you'll also learn how IP datagrams are routed between networks. You'll explore list components found in routing tables and the differences between common routing protocols. You'll also examine the routing metrics uses by RIP, OSPF, and EIGRP, as well as administrative distance and how it relates to router metrics. Finally, you'll learn about RIP routing loops, the use of the Border Gateway Protocol, and Layer 3 switching. This course was originally created by Global Knowledge (GK).
31 videos | 48m has Assessment available Badge
UDP and TCP Sessions
At the transport layer of the TCP/IP model, you find the User Datagram Protocol. When fast, connectionless transport is desired, then UDP is the protocol to use. In this course, you'll learn about the features associated with connectionless protocols. You'll explore the header fields of UPD, the functions and ranges of port numbers, and the port numbers that are used with UDP. You'll also learn what a socket is and how it is used with TCP/IP. When reliability is necessary for network communications, the Transmission Control Protocol is the protocol of choice. In this course, you'll also learn characteristics of connection-oriented protocols and TCP, as well as the names, sizes, and functions of each TCP header field. You'll explore the importance of eight session flags in the TCP header and how the window size field and maximum segment size options are used to provide flow control. Also, you'll explore the TCP options and their uses, along with the TCP connection and termination process. Finally, you'll learn about the use of sequence and acknowledgment numbers in providing reliable transport and the methods by which TCP manages network congestion. This course was originally created by Global Knowledge (GK).
31 videos | 43m has Assessment available Badge
Address Autoconfiguration, DNS, and ICMP
Every device that communicates in a TCP/IP network must have an IP address configured. The most efficient way to configure end devices in the network is to do so automatically. The Dynamic Host Configuration Protocol is used for such automatic configurations. In this course, you'll explore the disadvantages of static IP configuration and the steps for autoconfiguration using DHCP. You'll also learn about DHCP, including the message format, scopes, renewal process, how it works in a routed network, and troubleshooting techniques. The sheer volume of resources available on the Internet and enterprise networks is astounding. Trying to remember the IP address of even a fraction of these resources would be quite difficult. However, we can assign names to these resources and use the Domain Name System to translate easy to remember names into their specific IP addresses. In this course, you'll also learn about the organizations that coordinate the global DNS. You'll explore the organization and structure of the DNS namespace, the types of top level domains, the purpose of the root name servers and primary and secondary name servers, the DNS name resolution process, and the DNS message format. You'll also learn to match the abbreviations with the resource record function when give a list of resource record abbreviations. Finally, you'll examine the advantages of DDNS and DNS troubleshooting tools. The size and complexity of modern networks almost ensures that problems will sometimes occur in the delivery of IP packets. The Internet Protocol provides a mechanism for reporting error information when those problems arise. The Internet Control Messaging Protocol provides for diagnostic and error reporting in a TCP/IP network. You'll learn how ICMP provides error reports and diagnostic messages. You'll explore the layout of ICMP messages, as well as the common ICMP message types and their functions. You'll also learn to recognize several common types of ICMP messages by examining output from a protocol analyzer. Finally, you'll examine how the ICMP time exceeded message is used with traceroute. This course was originally created by Global Knowledge (GK).
31 videos | 43m has Assessment available Badge
Common TCP and UDP Applications and VoIP
From web browsing to e-mail, the most widely used applications in TCP/IP networks use application layer protocols that rely on TCP to provide reliable delivery. In this course, you'll explore the features and functions of Telnet and the internal operations of FTP. You'll also learn about the codes used in FTP, SMTP, and HTTP and examine the differences between SMTP, POP, and IMAP. Key network support activities are supported by application layer protocols that rely on the User Datagram Protocol. In this course, you'll also learn about the Trivial File Transfer Protocol and how to identify the different TFTP messages. You'll explore the use of Simple Network Management Protocol in network management, as well as the role of the network management station SNMP agent and Management Information Base in SNMP. Finally, you'll learn about the use of remote networking monitoring. Voice over IP is a good example of applying the TCP/IP protocols to carry time sensitive information such as voice or video. VoIP relies on various protocols to deliver new and innovative ways of communicating over TCP/IP networks. You'll learn about the TCP/IP protocols that support VoIP, the benefits of VoIP, and the basic components of a VoIP system. You'll explore how Session Initiation Protocol sets up a telephone call, the use of session description protocol, and some common VoIP codecs. You'll also learn about Real-time Transport Protocol. This course was originally created by Global Knowledge (GK).
35 videos | 54m has Assessment available Badge
TCP/IP Security and IPv6
Any discussion of networking would not be complete without addressing information security. The TCP/IP protocols were not originally designed with security in mind. In this course, you'll explore common vulnerabilities at each layer of the TCP/IP module and common mitigations for those security weaknesses. You'll learn the components of the CIA triad, as well as some vulnerabilities and attacks at each of the four layers of the TCP/IP model. Next, you'll examine the network access layer security protocols, the components of IPsec, and the phases of an IPsec session. You'll learn about the role of virtual private networking in providing TCP/IP security. Finally, you'll explore how Transport Layer Security, Domain Name System Security Extensions, and Secure Shell Protocol are involved in TCP/IP security. Internet Protocol version 4 is now more than 30 years old. Among other consequences of its advancing age, the public Internet has depleted the available addresses that can be assigned. While several efforts have been developed to address this problem, the true solution is in the implementation of Internet Protocol version 6. In this course, you'll also explore the three categories of IPv6 address and their format and structure. You'll learn the process of mapping an IEEE MAC address into a 64-bit EUI format for IPv6 address. You'll also examine the types of IPv6 address, the characteristics of the IPv6 header, and the common types of ICMPv6 messages. Finally, you'll learn to describe changes to the DNS records with IPv6 and about modifications to common routing protocols used with IPv6. This course was originally created by Global Knowledge (GK).
25 videos | 52m has Assessment available Badge

COURSES INCLUDED

Programming Fundamentals : Command Line Interface & Operating System Commands
In computer programming, commands are a common method of interacting with a computer to perform specific operations. A computer's command line interface (CLI) tool is used to enter, accept, and forward commands to the computer's operating system (OS). The commands and CLI will vary depending on the OS used (Microsoft, Linux, macOS, etc.) Use this course to get started with some of the most common commands used in Windows and Linux systems. Learn the commands that generate the most return in terms of productivity, such as engaging with files, folders, and programs. In doing this, become comfortable with using Windows and Linux CLIs. By the end of the course, you'll be able to execute the most frequently used commands on a Windows or Linux system.
12 videos | 1h 1m has Assessment available Badge
Programming Fundamentals: Introduction to Programming
The fundamentals of computer programming are not only for novice programmers. Knowing how humans manipulate computer programs can be game-changing for many other roles, such as UI designers, support engineers, or system administrators. This course acts as an introduction to programming for all. Discover the structure of a simple program, identifying the role of each part. Examine variables, looking at their types and purpose in a program. Dive into the role of functions, discovering how they use variables to achieve a result. Moving along, explore standard file operations, the use of a main method, the difference between compilation and interpretation, and different types of programming languages. When you're done, you'll be able to give a theoretical explanation of the elements and methods involved in programming.
12 videos | 55m has Assessment available Badge
Programming Fundamentals: Systematic Design with Pseudocode
The first step in the process of dependable computer programming is to plan and design how that program will be structured and behave. This involves using pseudocode and other design tools before diving into writing the actual computer program. Use this course to become familiar with the design process behind writing a computer program. Learn how to use pseudocode to turn a computer into a series of logical steps. Explore program flow, decision making, and looping. Moving on, examine how algorithms and flowcharts are used in computer program design. By the end of the course, you'll be able to start developing a computer program using pseudocode and algorithms.
11 videos | 50m has Assessment available Badge
Programming Fundamentals: Algorithms, Sorting, & Searching
Sorting and searching involve the three programming concepts of sequence, selection, and repetition. At least one of these three concepts is present in every program ever written. There are special sorting and searching algorithms that you'll likely need to use when developing a computer program. Use this course to investigate the main algorithms used in program development. Recognize their efficacy and how they're used as problem-solving tools. Learn about various algorithm types. Moving along, examine two sorting and two searching algorithms in detail. By the end of the course, you'll be able to recognize how sorting and searching algorithms apply to computer program development.
9 videos | 30m has Assessment available Badge
Programming Fundamentals: Object-oriented Programming
If you're learning computer programming, you need to know what object-oriented programming (OOP) is. One of the most prolific and frequently used programming paradigms, OOP has many benefits, such as code reusability, maintenance, scalability, and collaboration. The pragmatic structure of OOP means you can build large and complex programs with ease and efficiency. Use this course to examine what comprises OOP, including its use of objects and its core features of inheritance, encapsulation, and polymorphism. Distinguish between OOP and another standard programming paradigm, procedural programming. Finally, explore the most popular OOP languages and begin writing programs using three of these. Upon completion, you'll recognize how to use object-oriented programming to build versatile computer programs.
11 videos | 49m has Assessment available Badge
Programming Fundamentals: Programming Best Practices
Like any valuable and skilled process, there are best practices established in computer programming that, if used, will make your work more effective in every respect. Use this course to become familiar with programming best practices at all phases of development. Firstly, examine the rationale for using standards and best practices in the programming world. Then, delve into the "how and why" behind multiple types of best practices. Among others, explore documentation, programming style, and integrated development environment (IDE) usage. As you advance, practice exception handling, as most beginner programmers introduce errors in their programs. Lastly, take a look at code review as a vital tool in developing good programs. When you're done, you'll be able to level up as a programmer by using game-changing best practices.
10 videos | 44m has Assessment available Badge

COURSES INCLUDED

Cybersecurity and Networking Fundamentals
The goal of cybersecurity is to protect systems, networks, data, and programs from digital attacks. As cyber-attacks continue to increase in frequency and sophistication, it is imperative that cybersecurity professionals learn how to quickly identify and mitigate vulnerabilities. In this course, you will learn common security terminology including threats, vulnerabilities, attacks, exploits, controls, and countermeasures. Discover the fundamentals of the confidentiality, integrity, and availability (CIA) triad, and explore the five elements of the AAA framework; identification, authentication, authorization, auditing, and accountability. You'll then explore risk considerations and management strategies, and discover how risks can be mitigated, accepted, transferred, and rejected. Lastly, explore core networking components and discover how information flow models are used to prevent unauthorized information flow in any direction. This course was originally created by Global Knowledge (GK).
13 videos | 42m has Assessment available Badge
Systems Hardening
Security hardening is the process of securing systems and networks by reducing the surface of vulnerability. In this course, you'll learn the types of systems that can be hardened as well as how security baselines can be used to define normal conditions on a network. Explore how Group Policy can be used to apply computer settings to numerous systems at once, and discover the benefits of performing ongoing security patching. Explore steps used to harden systems by role including: client, server, database, web server, FTP, DNS, DHCP, network, and mobile devices. Lastly, learn how to differentiate between free and commercial hardening tools, recognize steps to properly implement authentication, authorization, and accounting, and implement physical security to contribute to overall security stability. This course was originally created by Global Knowledge (GK).
24 videos | 1h 4m has Assessment available Badge
Security Architecture
Security architecture can be defined as the specifications, processes, and standard operating procedures (SOPs) required to protect an organization's IT infrastructure. In order to improve network security and mitigate risks, a series of network devices can be used to control access to networks and resources. In this course, explore how security architectures can be used to enforce security at the network layer. Explore basic switching and routing devices, and discover core functions of a network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS). Explore the characteristics and categories of firewall devices, and learn about networks, intranets, and demilitarized zones. Discover the benefits of network segmentation and learn how to segment networks. Lastly, discover how Network Address Translation (NAT) is used to map addresses, and explore how Network Access Control (NAC) can be used to verify compliance using security policies. This course was originally created by Global Knowledge (GK).
19 videos | 1h 11m has Assessment available Badge
Network Hardening, Network Segmentation, and Secure Connections
Network hardening can help identify potential vulnerabilities, secure systems, and reduce the risk of unauthorized access. In this course, you'll learn how to secure administrative and remote access connections. You'll discover key features of the Simple Network Management Protocol (SNMP) and explore the various types of firewalls and logical locations to place them on a network. Discover how to control and manage traffic using rules on routers and firewalls, and explore how firewall management can contribute to overall network hardening. Discover how to limit internal and external physical access to resources. Explore best practices for managing telecom and wiring closets as well as considerations for establishing secure access. Lastly, explore the importance of hardening wireless access points and recognize how to harden network elements including firewalls, routers, and access points. This course was originally created by Global Knowledge (GK).
27 videos | 1h has Assessment available Badge
Social Engineering Threats and Prevention
Social engineering is a form of attack that is accomplished using malicious activities through human interactions. In a common social engineering attack, humans are tricked into making security mistakes or giving away sensitive information. In this course, you'll explore the goals of social engineering including gaining access to sensitive data, physical locations, and systems. Discover vulnerabilities that make social engineering possible, explore common targets, and learn about indirect and direct social engineering attacks. Explore how searching a person or business's trash can produce information that can be used to carry out an attack, and discover the importance of staying up to date with the latest social engineering stats and trends. Explore the importance of cyber awareness and reporting workplace abnormalities, and discover the various social media site types including social networks, video sharing, blogging, and photo sharing. Lastly, explore factors that drive people to post compromising material on social media. This course was originally created by Global Knowledge (GK).
27 videos | 1h 2m has Assessment available Badge
Physical Security, Safety Procedures, and Access Control
Physical security measures can help organizations protect personnel, hardware, software, and data from physical actions and events that could result in unauthorized or unwanted disclosure or theft of property. In this course, you'll learn how defense-in-depth solutions can provide multiple layers of security as well as the various types of physical security controls. Explore the importance of surge protectors, uninterrupted power supplies (UPS), and power generators, and discover how device security concerns should encompass all company-owned equipment. Discover why non-disclosure agreements (NDA) should be used in locations where proprietary information may be accessible to employees, vendors, or visitors, and explore how background checks should be an essential part of security management. Lastly, explore the importance of ensuring the correct level of security access levels. This course was originally created by Global Knowledge (GK).
18 videos | 47m has Assessment available Badge

COURSES INCLUDED

Cybersecurity and Networking Fundamentals
The goal of cybersecurity is to protect systems, networks, data, and programs from digital attacks. As cyber-attacks continue to increase in frequency and sophistication, it is imperative that cybersecurity professionals learn how to quickly identify and mitigate vulnerabilities. In this course, you will learn common security terminology including threats, vulnerabilities, attacks, exploits, controls, and countermeasures. Discover the fundamentals of the confidentiality, integrity, and availability (CIA) triad, and explore the five elements of the AAA framework; identification, authentication, authorization, auditing, and accountability. You'll then explore risk considerations and management strategies, and discover how risks can be mitigated, accepted, transferred, and rejected. Lastly, explore core networking components and discover how information flow models are used to prevent unauthorized information flow in any direction. This course was originally created by Global Knowledge (GK).
13 videos | 42m has Assessment available Badge
Discovery and Attack Vectors
The discovery phase includes performing different types of reconnaissance on a target. To accomplish this, attackers can use a series of techniques, exploits, and tools. In this course, learn about common attack vectors such as malware, social engineering, and session hijacking. Discover how to collect legacy and archived web page content using discovery tools, and learn how to identify domains and IP addresses using the Netcraft website. Explore how to maximize command-line tools to discover shares and local network configurations, and learn the importance of checking to see if targets are using default passwords. You'll also discover how footprinting can be used to extract details of a website, how to disable NetBIOS, how to use kali to perform banner grabbing. Lastly, discover countermeasure techniques such as using generic domain names, hardening systems, and turning off unnecessary protocols and services. This course was originally created by Global Knowledge (GK).
10 videos | 45m has Assessment available Badge
Vulnerabilities, Systems Scanning and Exploitation
Vulnerabilities can be defined as a flaw or weakness that can be exploited. One method to identify vulnerabilities is to use a scanner to assess computers, networks, and applications for known weaknesses. By using a scanner, attackers can learn how to best exploit a target system. In this course, you will learn how port scanning works and recognize common ports with known protocols. Discover how to perform network discovery using Nmap, as well as how to perform vulnerability scanning using Nessus. Discover how to exploit a target system using Nessus and Metasploit, and explore how to take over a remote system. Lastly, you'll also explore vulnerability and system scanning countermeasures, and explore countermeasure techniques used to protect against system exploitation. This course was originally created by Global Knowledge (GK).
11 videos | 49m has Assessment available Badge
Malware Analysis
Malware is software that is designed to intentionally wreak destruction and gain access to sensitive information on a target system. In this course, you'll learn about the potential effects that malware can have on a system, as well as common malware types including cavity, stealth, polymorphic, metamorphic, and memory-resident viruses. You'll learn about backdoor exploits, and discover how they can be executed using FTP, HTTP, and password stealing. You'll then learn about the characteristics of worms, spyware, and adware, as well as common techniques and infection methods used by malware to exploit a system. Explore countermeasures used to prevent being infected by malware, and learn how to use security tools and solutions to prevent systems from being compromised. This course was originally created by Global Knowledge (GK).
10 videos | 48m has Assessment available Badge
Cybersecurity Awareness and Threat Vectors
Cybersecurity is often defined as the protection of computer systems and networks from unauthorized or unwanted information disclosure, theft or damage. In this course, explore the potential impacts of a personal or business security breach, and discover the fundamentals of the confidentiality, integrity, and availability triad. Explore how baselining can be used to better understand an IT environment and learn to differentiate between natural, malicious human, chemical, and non-malicious threats. Explore security concerns as they relate to internal and external human activity, and discover how to identify drivers for security controls. Explore common functions and purposes of security controls and discover the importance of testing corrective controls in place. Lastly, explore how to differentiate between quantitative and qualitative risk analysis, as well as between data in motion and data at rest. This course was originally created by Global Knowledge (GK).
20 videos | 42m has Assessment available Badge
Network Discovery Tools and Techniques
Network discovery is the process of identifying or mapping internal networks and computer resources in an organization. Conveniently, network discovery tools can be used to automate the scanning process and discover all the devices on a specific network. In this course, you'll learn about the OSI and TCP/IP models, and how they are used to facilitate communication between entities on a network. Explore how security controls behave at different layers of the OSI and TCP/IP models. Explore common network devices and learn how they can be compromised physically or administratively. Discover how to differentiate between discovery, footprinting, and scanning tools, and explore categories of discovery tools including auditing, vulnerability scanning, and SNMP. Explore Nmap, Zenmap, and SuperScan network discovery tools, and learn when to use protocol analyzer tools such as Wireshark. Lastly, discover the benefits of periodically referencing the Common Vulnerabilities and Exposures database. This course was originally created by Global Knowledge (GK).
21 videos | 1h 1m has Assessment available Badge
Systems Hardening
Security hardening is the process of securing systems and networks by reducing the surface of vulnerability. In this course, you'll learn the types of systems that can be hardened as well as how security baselines can be used to define normal conditions on a network. Explore how Group Policy can be used to apply computer settings to numerous systems at once, and discover the benefits of performing ongoing security patching. Explore steps used to harden systems by role including: client, server, database, web server, FTP, DNS, DHCP, network, and mobile devices. Lastly, learn how to differentiate between free and commercial hardening tools, recognize steps to properly implement authentication, authorization, and accounting, and implement physical security to contribute to overall security stability. This course was originally created by Global Knowledge (GK).
24 videos | 1h 4m has Assessment available Badge
Security Architecture
Security architecture can be defined as the specifications, processes, and standard operating procedures (SOPs) required to protect an organization's IT infrastructure. In order to improve network security and mitigate risks, a series of network devices can be used to control access to networks and resources. In this course, explore how security architectures can be used to enforce security at the network layer. Explore basic switching and routing devices, and discover core functions of a network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS). Explore the characteristics and categories of firewall devices, and learn about networks, intranets, and demilitarized zones. Discover the benefits of network segmentation and learn how to segment networks. Lastly, discover how Network Address Translation (NAT) is used to map addresses, and explore how Network Access Control (NAC) can be used to verify compliance using security policies. This course was originally created by Global Knowledge (GK).
19 videos | 1h 11m has Assessment available Badge
Securing Information using Cryptography
Cryptography is a process used to keep information secret and safe by transforming it into an unrecognizable form that unwanted and unintended recipients cannot understand. In this course, you'll explore how cryptography can be used for confidentiality and integrity. Discover when to use symmetric and asymmetric encryption and discover the advantages and disadvantages of both. Explore practical use cases for cryptography and explore how hashing can be used to ensure data integrity. Discover how digital signatures can provide message integrity, authenticity, and non-repudiation and learn how to implement digital signatures. Discover how to differentiate between rights and permissions and explore access control methods such as discretionary access control, mandatory access control, and role-based access control. Lastly, explore how steganography can be used to hide secret information in or on another object, and how digital rights management (DRM) tools can be used to control access to protected data. This course was originally created by Global Knowledge (GK).
25 videos | 1h 20m has Assessment available Badge
Public Key Infrastructure and Certificate Distribution
Public-key infrastructure (PKI) is the framework of encryption and cybersecurity used to safely distribute, verify and revoke certificates in an organization and manage public-key encryption. In this course, you will learn the fundamentals of PKI and explore considerations when implementing trust structures through technology and public key-based digital certificates. Explore PKI components including certification authorities, certificates, revocation lists, registration authorities, entities and certificate templates, and discover how certificate authorities (CA) are used to issue certificates to entities and manage trust relationships. Discover how to differentiate between root and subordinate CAs as well as internal and external PKIs, and explore public key certificates and how they can represent the digital identity of the subject. Lastly, explore common certificate acquisition methods including web, auto-enrollment, MMCs, and native consoles, and explore use cases for common access cards (CAC). This course was originally created by Global Knowledge (GK).
17 videos | 53m has Assessment available Badge
Identity Management, Directory Services, and Federation
Identity management is a framework used to ensure appropriate access controls are in place to grant authenticated users access to enterprise assets. In this course, you will learn about the key fundamentals of identity management, including privilege administration, access control, and system scalability. Explore identification, authentication, authorization, accountability (IAAA) services and discover how personally identifiable information (PII) can be used to identify a subject. Explore the three main types of authentication factors: something you know, something you have, and something you are, and discover how to choose appropriate and accurate biometric criteria. You'll also learn about directory services and how they can be used to organize network resources. Explore password cracking techniques and tools, and discover when to use same sign-on and single sign-on authentication schemes. Lastly, explore how federation can be used to link together different authentication systems. This course was originally created by Global Knowledge (GK).
27 videos | 1h 19m has Assessment available Badge
Network Hardening, Network Segmentation, and Secure Connections
Network hardening can help identify potential vulnerabilities, secure systems, and reduce the risk of unauthorized access. In this course, you'll learn how to secure administrative and remote access connections. You'll discover key features of the Simple Network Management Protocol (SNMP) and explore the various types of firewalls and logical locations to place them on a network. Discover how to control and manage traffic using rules on routers and firewalls, and explore how firewall management can contribute to overall network hardening. Discover how to limit internal and external physical access to resources. Explore best practices for managing telecom and wiring closets as well as considerations for establishing secure access. Lastly, explore the importance of hardening wireless access points and recognize how to harden network elements including firewalls, routers, and access points. This course was originally created by Global Knowledge (GK).
27 videos | 1h has Assessment available Badge
Fundamentals of Malware Analysis and Remediation
Malware is any software with the intention to wreak destruction or gain access to sensitive information. Malware is often used as a blanket term for common computer worms, viruses, and trojans. In this course, you'll learn how to protect systems from malware by implementing and managing anti-malware software. Explore different malware infection methods and learn how to differentiate between different types of malware. Explore how viruses can attach themselves to system applications and learn about common virus threats. Discover how to differentiate between worms, trojans, rootkits, and bots, and explore how spyware and adware spyware can be embedded into applications that look free and interesting to use. Lastly, explore how ransomware works and discover countermeasures to protect against threats including user awareness programs, scanning systems, and monitoring network activity. This course was originally created by Global Knowledge (GK).
23 videos | 56m has Assessment available Badge
Social Engineering Threats and Prevention
Social engineering is a form of attack that is accomplished using malicious activities through human interactions. In a common social engineering attack, humans are tricked into making security mistakes or giving away sensitive information. In this course, you'll explore the goals of social engineering including gaining access to sensitive data, physical locations, and systems. Discover vulnerabilities that make social engineering possible, explore common targets, and learn about indirect and direct social engineering attacks. Explore how searching a person or business's trash can produce information that can be used to carry out an attack, and discover the importance of staying up to date with the latest social engineering stats and trends. Explore the importance of cyber awareness and reporting workplace abnormalities, and discover the various social media site types including social networks, video sharing, blogging, and photo sharing. Lastly, explore factors that drive people to post compromising material on social media. This course was originally created by Global Knowledge (GK).
27 videos | 1h 2m has Assessment available Badge
Software Engineering, Security and Vulnerabilities
The principles of software engineering include designing, developing, implementing, and maintaining a software solution. One crucial aspect of software security is to determine if software is safe to release to an organization or public. In this course, you'll explore the Software Development Life Cycle (SDLC) and learn about maturity levels used to define agility and effectiveness of a development solution. Discover how security guidelines can help improve the quality and security of a software development, and explore the importance of staying current with the types and trends of software threats and exploits. Continue to learn about software vulnerabilities while exploring common attacks including buffer overflows, database injection, cross-site scripting, and directory traversal attacks. Lastly, explore how misconfiguration of servers increases the likelihood of attacks, and discover how permissions are used to secure directories used by applications. This course was originally created by Global Knowledge (GK).
15 videos | 57m has Assessment available Badge
Environment Monitoring, Retention, and Data Logging
Logging is used to record events that occur within an organization's systems and networks. Oftentimes, logging information can help with the identification and isolation of any intruder or malware. In this course, explore acceptable use policies (AUP) and how they apply to employee monitoring. Discover how monitoring as a service can benefit an organization, and explore devices that can be monitored on a network including routers, switches, laptops, and wireless access points. Explore how retention policies can identify how long different types of data are maintained and discover when to implement a centralized enterprise logging service. Lastly, explore how keystroke loggers can capture and track what is typed on a keyboard and learn the importance of protecting log information. This course was originally created by Global Knowledge (GK).
23 videos | 52m has Assessment available Badge
Physical Security, Safety Procedures, and Access Control
Physical security measures can help organizations protect personnel, hardware, software, and data from physical actions and events that could result in unauthorized or unwanted disclosure or theft of property. In this course, you'll learn how defense-in-depth solutions can provide multiple layers of security as well as the various types of physical security controls. Explore the importance of surge protectors, uninterrupted power supplies (UPS), and power generators, and discover how device security concerns should encompass all company-owned equipment. Discover why non-disclosure agreements (NDA) should be used in locations where proprietary information may be accessible to employees, vendors, or visitors, and explore how background checks should be an essential part of security management. Lastly, explore the importance of ensuring the correct level of security access levels. This course was originally created by Global Knowledge (GK).
18 videos | 47m has Assessment available Badge
Incident Response, Backup and Recovery Strategies, and Documentation
It is imperative that organizations outline instructions to help IT staff identify, respond, and recover from network security incidents. By doing so, organizations can quickly recover from cybercrime events potentially resulting in data loss and service outages. In this course, you'll explore common disaster types, including natural disasters and malicious human actions that threaten organizations. Discover business continuity and disaster recovery planning goals, resources, and concepts. Discover how operational recovery planning can help ensure businesses resume day to day operations in a timely manner, as well as the importance of planning for user recovery. You'll also learn about backup technologies and strategies, and discover the importance of proper documentation. Lastly, explore how to prepare for incident responses and learn about reporting incidents and legal considerations. This course was originally created by Global Knowledge (GK).
41 videos | 1h 34m has Assessment available Badge
Legal Considerations and Cybercrime Investigations
Cybercrime laws apply to incidents in which a crime was directed at a computer, or crimes committed using a computer. In this course, you'll explore aspects of service-level agreements (SLA) and privacy-level agreements (PLA), and discover considerations when dealing with international regulatory compliance. You'll also learn how cybercrime intersects with different legal fields including intellectual property, privacy laws, jurisdiction, criminal, and civil, and explore methods in which to investigate cybercrime activity. Explore key considerations when dealing with criminal, civil law, and administrative laws, and learn to differentiate between civil, common, statutory, and religious legal systems. Lastly, explore tools used to perform a cybercrime investigation, and discover cybercrime investigative best practices, including how to notify management and protect the crime scene. This course was originally created by Global Knowledge (GK).
22 videos | 55m has Assessment available Badge
Trends in Cybersecurity
Cybersecurity is the practice of protecting systems, networks, and programs from cyber threats and exploits. Therefore, organizations are required to allocate a growing number of resources to protect their data from unwanted and unauthorized data breaches and disclosures. In this course, you'll explore the possible constraints that may prevent an organization from having an ideal IT security solution including budget, regulations, design limitations, and political issues. Discover driving forces in cybersecurity including money, mobile devices, education, and new technologies, and explore the risks associated with portable electronic devices (PED) such as geolocations. Explore how supervisory control and data acquisition (SCADA) systems can be used to monitor important infrastructure including electric grids, water supplies, and pipelines, and discover how most people now use the Internet daily to send email, shop, and watch TV. Lastly, discover how cybersecurity and IT standards continue to evolve and how no one standard is foolproof or future proof. This course was originally created by Global Knowledge (GK).
18 videos | 45m has Assessment available Badge

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE TRACKS

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.