Learn the core concepts needed to secure your organization's network as an IT security specialist. In this learning path, you'll cover all the foundations of IT security: from practical skills for securing hardware and network data to the basics of cryptography and cybercrime investigation and response.
Learn the principles of IT security and cybersecurity.
Develop practical skills for securing networks.
Investigate cybercrimes and know the basics of computer forensics.
IT Security Foundations: Core Concepts with Lisa Bock
Prepare for MTA exam 98-367, Security Fundamentals. Learn the core concepts of operating system and network-level security to avoid threats and eliminate system vulnerabilities.
1h 35m • COURSE
Cybersecurity Foundations with Malcolm Shore
Set a rock-solid foundation for your network, users, and data by learning the basics of cybersecurity. Explore key frameworks, threats, and strategies for responding to incidents.
1h 59m • COURSE
IT Security Foundations: Operating System Security with Lisa Bock
Learn how to secure a Windows operating system as you prepare to take and pass the Microsoft Technology Associate (MTA) exam 98-367, Security Fundamentals.
1h 38m • COURSE
IT Security Foundations: Network Security with Lisa Bock
Learn how to secure an organization's network to keep your interconnected systems and data safe and prepare for Microsoft Technology Associate (MTA) exam 98-367.
2h • COURSE
Learning SSL/TLS with Daniel Lachance
Learn the skills you need to plan, implement, and maintain a public key infrastructure (PKI) ecosystem that supports SSL/TLS security certificates.
2h 24m • COURSE
Cybersecurity with Cloud Computing (2015) with Malcolm Shore
Learn how to plan for and minimize risk when deploying cloud services such as Dropbox, Amazon Web Services, and Azure at your organization.
2h 25m • COURSE
Learning Computer Forensics with Jungwoo Ryoo
Learn how to acquire and analyze data from computers or storage devices with computer forensics.
2h 49m • COURSE
Learning Vulnerability Management with Lora Vaughn
Learn the basics of vulnerability management. Discover why vulnerabilities exist, as well as how to manage them from start to finish.
53m 54s • COURSE
Learning Threat Modeling for Security Professionals with Adam Shostack
Threat modeling helps security professionals understand what can go wrong—and what to do about it. Learn to use the four-question and STRIDE frameworks for threat modeling.
41m 41s • COURSE
Artificial Intelligence for Cybersecurity with Sam Sehgal
Learn how to leverage artificial intelligence (AI) to solve complex problems in the field of information security. Along the way, explore the risks of using AI for security.
1h 15m • COURSE
Soft Skills for Information Security Professionals with Jerod Brennen
Information security isn’t all ones and zeros. Learn how to communicate security concepts and proposals in terms that will resonate with audiences of all technical abilities.
1h 18m • COURSE
You'll learn information security with these experts.
Lisa Bock is an experienced author with a demonstrated history of working in the elearning industry.
Lisa is a security ambassador with a broad range of IT skills and knowledge, including networking, Wireshark, biometrics, and IoT. Lisa is an award-winning speaker, who has presented at several national IT conferences. She holds a master's degree in computer information systems/information assurance from the University of Maryland University College. Lisa was an associate professor in the IT department at Pennsylvania College of Technology (Williamsport, Pennsylvania) from 2003 until her retirement in 2020. She is involved with various volunteer activities, and she and her husband, Mike, enjoy bike riding, watching movies, and traveling.
Malcolm Shore is a cybersecurity expert who spent ten years as a director at New Zealand's GCSB.
Dr. Shore was the principal security officer at the Australian National Broadband Network Company and the director of education and community relations for the Australian Information Security Association. He's currently a technical director at BAE Systems Applied Intelligence, and an educator in the fields of forensics, information warfare, security management, and applied cryptography. He holds a PhD in information security.
Daniel Lachance is a consultant, trainer, author, and editor at Lachance IT Consulting Inc.
A highly motivated and passionate IT evangelist, Daniel has over 20 years of experience implementing and supporting a wide variety of hardware and software. His skills include system administration, technical IT training, and planning and implementing technology solutions related to networking.
Jungwoo Ryoo teaches IT, cyber security, and risk analysis at Penn State.
Jungwoo is a professor of information sciences and technology (IST) at the Pennsylvania State University (Altoona College). He is also a graduate and affiliated faculty member of the College of Information Sciences and Technology at Penn State, and a tenured faculty member of the B.S. degree program in security and risk analysis at Penn State Altoona.
Lora Vaughn is a cybersecurity executive in the financial services industry.Lora boasts a wealth of vulnerability management and security expertise, which she brings to her current role as the senior vice president, chief information security officer at a large, Arkansas-based financial company. She has held a variety of other positions in the bank and financial services industry, including vice president of the cybersecurity operations center. In this role, she worked to manage and support 24/7 security monitoring, develop incident response playbooks, and research and implement emerging technologies for incident response and threat hunting. Lora earned a BS in computer science from Birmingham-Southern College and is a CISSP.
Adam Shostack is a consultant, entrepreneur, technologist, author, and game designer.
He's a member of the Black Hat Review Board, and helped found the Common Vulnerabilities and Exposures (CVE) and many other things. He's currently helping a variety of organizations improve their security, and advising startups as a MACH37 Stars Mentor Network. While at Microsoft, he drove the AutoRun fix into Windows Update, was the lead designer of the SDL Threat Modeling Tool v3, and created the Elevation of Privilege game. Adam is the author of Threat Modeling: Designing for Security and the co-author of The New School of Information Security.
Sam Sehgal is a cloud and application security leader with experience leading security strategy and execution.
Sam has extensive experience with the standards, policies, and modern secure DevOps tools needed to govern product and application security programs. He currently leverages his skills at Dell, where he works as a program lead. In this role, he focuses on DevSecOps security and architecture, as well as Secure Development Lifecycle (SDL) automation. In addition to earning a bachelor's degree in network communications and software engineering, Sam has an MBA and holds several certifications, including Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH).
Jerod Brennen is a security architect, advisor, speaker, and teacher. He has 20+ years of infosec experience.
Jerod focuses on helping people improve the security of the technologies and business processes at their organizations. Whether serving as a consultant, manager, or specialist, he focuses on information risk management and presents regularly at infosec conferences. Jerod has hands-on experience in application security, business analysis, compliance, access management, penetration testing, risk assessment, security architecture, incident response, and strategic planning.