Published 12/2023
MP4 | Video: h264, 1920×1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.03 GB | Duration: 3h 40m

Building Strong Foundations in Cybersecurity and Information Protection

 

 

What you’ll learn

Understanding Network Defense Goals: Learn the purposes and approaches of network defense.

Basics of Network Security Protocols: Gain knowledge of various network security protocols.

Linux Fundamentals for Network Security: Acquire basic Linux concepts relevant to network security.

Types of Network Security Controls: Understand different physical and technical security controls.

Identification and Authentication Methods: Learn about various identification and authentication techniques.

Implementing Physical Security Measures: Understand the importance and methods of physical security in network defense.

Technical Controls like Firewalls and IDS/IPS: Gain insights into firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems (IPS).

Virtualization and Cloud Computing Security: Explore security aspects of virtualization and cloud computing.

Wireless Network Security: Learn about encryption and authentication methods in wireless networks.

IoT Device Security: Understand security best practices for Internet of Things (IoT) devices.

Cryptography and Public Key Infrastructure (PKI): Delve into various cryptography techniques and PKI infrastructure.

Data Security Techniques: Learn about data encryption, backup retention, and data loss prevention solutions.

Practical Implementation of Security Solutions: Implement and test security solutions like IDS/IPS and VPNs through mini-projects.

Requirements

Basic IT Knowledge: A foundational understanding of information technology concepts is essential.

Familiarity with Network Concepts: Basic knowledge of networking, such as understanding of IP addresses, network protocols, and common network architectures.

Linux Skills: Some familiarity with Linux operating systems, as the course will involve Linux-based tasks and implementations.

Computer with Internet Access: A reliable computer with internet access is necessary to access course materials and perform practical exercises.

Software Installation Capability: Ability to install and configure software, as the course may require setting up various security tools and applications.

Critical Thinking and Problem-Solving Skills: These skills will be beneficial for understanding security challenges and implementing solutions.

Willingness to Learn: As the course covers both basics and advanced concepts, a strong willingness to learn and engage with new concepts is important.

DOWNLOAD FROM HOT4SHARE.COM