Learn the core concepts needed to secure your organization's network as an IT security specialist. In this learning path, you'll cover all the foundations of IT security: from practical skills for securing hardware and network data to the basics of cryptography and cybercrime investigation and response.
Learn the principles of IT security and cybersecurity.
Develop practical skills for securing networks.
Investigate cybercrimes and know the basics of computer forensics.
IT Security Foundations: Core Concepts with Lisa Bock
Prepare for MTA exam 98-367, Security Fundamentals. Learn the core concepts of operating system and network-level security to avoid threats and eliminate system vulnerabilities.
1h 35m • COURSE
Cybersecurity Foundations with Malcolm Shore
Set a rock solid foundation for your network, users, and data by learning the basics of cybersecurity. Learn about risk and control frameworks such as NIST and COBIT 5, detecting and understanding malware threats, architecting more secure systems, and responding to incidents when they do occur.
2h 26m • COURSE
IT Security Foundations: Operating System Security with Lisa Bock
Learn how to secure a Windows operating system as you prepare to take and pass the Microsoft Technology Associate (MTA) exam 98-367, Security Fundamentals.
1h 38m • COURSE
IT Security Foundations: Network Security with Lisa Bock
Learn how to secure an organization's network—keeping your interconnected systems and data safe—and prep for MTA Exam 98-367.
1h 37m • COURSE
Cybersecurity for IT Professionals with Malcolm Shore
Protect your networks from cyberattacks. Learn how to implement antivirus protection and firewalls and scan for suspicious activity.
2h 27m • COURSE
Learning SSL/TLS with Daniel Lachance
Learn the skills you need to plan, implement, and maintain a public key infrastructure (PKI) ecosystem that supports SSL/TLS security certificates.
2h 24m • COURSE
Cybersecurity with Cloud Computing with Malcolm Shore
Learn how to plan for and minimize risk when deploying cloud services such as Dropbox, Amazon Web Services, and Azure at your organization.
2h 25m • COURSE
Learning Computer Forensics with Jungwoo Ryoo
Learn how to acquire and analyze data from computers or storage devices with computer forensics.
2h 49m • COURSE
Learning Cryptography and Network Security with Lisa Bock
Understand the basics of cryptography to keep your networks, systems, and data secure.
1h 45m • COURSE
Learning Vulnerability Management with Lora Vaughn McIntosh
Learn the basics of vulnerability management. Discover why vulnerabilities exist, as well as how to manage them from start to finish.
53m 54s • COURSE
You'll learn information security with these experts.
Since 2004, Lisa Bock has been teaching IT, everything from forensics to network security.
Lisa is an associate professor in the Information Technology department at Pennsylvania College of Technology, in Williamsport, PA. Courses she has taught during the past 13 years include: networking, security, biometrics, technical support, protocol vulnerabilities (using Wireshark), CCNA Security, and VoIP and Unified Communications. She holds an MS from University of Maryland University College (UMUC) along with numerous other certifications. She has had training in forensics, networking, steganography, and network security. She is involved with various volunteer activities, has evaluated professional journals, and is an award-winning speaker. Lisa and her husband Mike enjoy bike riding, watching movies, and traveling.
Malcolm Shore is a cybersecurity expert who spent ten years as a director at New Zealand's GCSB.
Dr. Shore was the principal security officer at the Australian National Broadband Network Company and the director of education and community relations for the Australian Information Security Association. He's currently a technical director at BAE Systems Applied Intelligence, and an educator in the fields of forensics, information warfare, security management, and applied cryptography. He holds a PhD in information security.
Daniel Lachance is a consultant, trainer, author, and editor at Lachance IT Consulting Inc.
A highly motivated and passionate IT evangelist, Daniel has over 20 years of experience implementing and supporting a wide variety of hardware and software. His skills include system administration, technical IT training, and planning and implementing technology solutions related to networking.
Jungwoo Ryoo teaches IT, cyber security, and risk analysis at Penn State.
Jungwoo is a professor of information sciences and technology (IST) at the Pennsylvania State University (Altoona College). He is also a graduate and affiliated faculty member of the College of Information Sciences and Technology at Penn State, and a tenured faculty member of the B.S. degree program in security and risk analysis at Penn State Altoona.
Lora Vaughn McIntosh is a cybersecurity executive in the financial services industry.Lora boasts a wealth of vulnerability management and security expertise, which she brings to her current role as the senior vice president, chief information security officer at a large, Arkansas-based financial company. She has held a variety of other positions in the bank and financial services industry, including vice president of the cybersecurity operations center. In this role, she worked to manage and support 24/7 security monitoring, develop incident response playbooks, and research and implement emerging technologies for incident response and threat hunting. Lora earned a BS in computer science from Birmingham-Southern College and is a CISSP.