Video description
Stop attacks where they begin!
About This Video
- Explore affordable training solutions for IT professionals and system administrators in computer security
- Master security principles and configurations to improve a site's overall security posture
- Learn topics relevant to today's Information Technology landscape and environments
In Detail
Computer and network security is very important and relevant in today's business world. Many system administrators and information technology professionals do not have formal training in computer security and may lack the budget to hire security professionals. They need an affordable solution to help them secure their data and improve their security posture.
This video course will enable you to close the gap and be well acquainted with basic security fundamentals to improve their security. You will learn how to secure infrastructure, such as wireless access points, firewalls, and servers. Moving ahead, learn to secure applications and data by vulnerability scanning and patching, encryption, data loss prevention, and backups. Finally you will learn how to protect users from malware, phishing, and social engineering attacks and disaster recovery.
By the end of the course, you will be a cyber security specialist capable of preventing data breaches and data loss, as these measures could save a company thousands of dollars. These topics are relevant to today's Information Technology environment and protection is vital to business success.
Audience
This course is intended for system administrators and Information Technology staff who haven't had any training in computer/network security and who may lack the budget to hire security professionals. Basic computer/network knowledge is required and some experience configuring computers and networks is desirable. The user will learn techniques for securing their computers, networks, and data. They will learn how to improve their overall security posture.
Table of Contents
Chapter 1 : Protecting Computer and Network Infrastructure
The Course Overview
Security Posture
Firewalls and IDS: Secure Your Network and Hosts
Server Hardening
Securing Wireless Networks
Chapter 2 : Securing Applications and Data
Data Classification
Data Encryption
Data Loss Prevention
Application Vulnerability Assessment and Patching
Backing Up Data
Chapter 3 : Protecting Users
Social Engineering Attacks
BYOD - Bring Your Own Device
Incident Response
Malware
Disaster Recovery