Published 12/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.03 GB | Duration: 3h 40m
Building Strong Foundations in Cybersecurity and Information Protection
What you'll learn
Understanding Network Defense Goals: Learn the purposes and approaches of network defense.
Basics of Network Security Protocols: Gain knowledge of various network security protocols.
Linux Fundamentals for Network Security: Acquire basic Linux concepts relevant to network security.
Types of Network Security Controls: Understand different physical and technical security controls.
Identification and Authentication Methods: Learn about various identification and authentication techniques.
Implementing Physical Security Measures: Understand the importance and methods of physical security in network defense.
Technical Controls like Firewalls and IDS/IPS: Gain insights into firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems (IPS).
Virtualization and Cloud Computing Security: Explore security aspects of virtualization and cloud computing.
Wireless Network Security: Learn about encryption and authentication methods in wireless networks.
IoT Device Security: Understand security best practices for Internet of Things (IoT) devices.
Cryptography and Public Key Infrastructure (PKI): Delve into various cryptography techniques and PKI infrastructure.
Data Security Techniques: Learn about data encryption, backup retention, and data loss prevention solutions.
Practical Implementation of Security Solutions: Implement and test security solutions like IDS/IPS and VPNs through mini-projects.
Requirements
Basic IT Knowledge: A foundational understanding of information technology concepts is essential.
Familiarity with Network Concepts: Basic knowledge of networking, such as understanding of IP addresses, network protocols, and common network architectures.
Linux Skills: Some familiarity with Linux operating systems, as the course will involve Linux-based tasks and implementations.
Computer with Internet Access: A reliable computer with internet access is necessary to access course materials and perform practical exercises.
Software Installation Capability: Ability to install and configure software, as the course may require setting up various security tools and applications.
Critical Thinking and Problem-Solving Skills: These skills will be beneficial for understanding security challenges and implementing solutions.
Willingness to Learn: As the course covers both basics and advanced concepts, a strong willingness to learn and engage with new concepts is important.
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.