Learn the core concepts needed to secure your organization's network as an IT security specialist. In this learning path, you'll cover all the foundations of IT security: from practical skills for securing hardware and network data to the basics of cryptography and cybercrime investigation and response.
Learn the principles of IT security and cybersecurity.
Develop practical skills for securing networks.
Investigate cybercrimes and know the basics of computer forensics.
IT Security Foundations: Core Concepts with Lisa Bock
Prepare for MTA Exam 98-367. Learn the core concepts of operating system and network-level security to avoid threats and eliminate system vulnerabilities.
1h 13m • COURSE
Cybersecurity Foundations with Malcolm Shore
Set a rock solid foundation for your network, users, and data by learning the basics of cybersecurity. Learn about risk and control frameworks such as NIST and COBIT 5, detecting and understanding malware threats, architecting more secure systems, and responding to incidents when they do occur.
2h 26m • COURSE
IT Security Foundations: Operating System Security (2015) with Lisa Bock
Prep for MTA Exam 98-367, Security Fundamentals, and learn how secure a Windows operating system.
1h 22m • COURSE
IT Security Foundations: Network Security with Lisa Bock
Learn how to secure an organization's network—keeping your interconnected systems and data safe—and prep for MTA Exam 98-367.
1h 37m • COURSE
Cybersecurity for IT Professionals with Malcolm Shore
Protect your networks from cyberattacks. Learn how to implement antivirus protection and firewalls and scan for suspicious activity.
2h 27m • COURSE
Learning SSL/TLS with Daniel Lachance
Learn the skills you need to plan, implement, and maintain a public key infrastructure (PKI) ecosystem that supports SSL/TLS security certificates.
2h 24m • COURSE
Cybersecurity with Cloud Computing with Malcolm Shore
Learn how to plan for and minimize risk when deploying cloud services such as Dropbox, Amazon Web Services, and Azure at your organization.
2h 25m • COURSE
Learning Computer Forensics (2014) with Jungwoo Ryoo
Learn how to acquire and analyze data from computers or storage devices with computer forensics.
1h 57m • COURSE
Learning Cryptography and Network Security with Lisa Bock
Understand the basics of cryptography to keep your networks, systems, and data secure.
1h 45m • COURSE
Learning Computer Security Investigation and Response with Sandra Toner
Learn the basics of computer forensics and investigating cyber crimes. Find out how to collect and recover evidence of cyber crimes such as harassment and identity theft on Mac, Windows, and Linux computers.
1h 57m • COURSE
You'll learn information security with these experts.
Since 2004, Lisa Bock has been teaching IT, everything from forensics to network security.
Lisa is an associate professor in the Information Technology department at Pennsylvania College of Technology, in Williamsport, PA. Courses she has taught during the past 13 years include: networking, security, biometrics, technical support, protocol vulnerabilities (using Wireshark), CCNA Security, and VoIP and Unified Communications. She holds an MS from University of Maryland University College (UMUC) along with numerous other certifications. She has had training in forensics, networking, steganography, and network security. She is involved with various volunteer activities, has evaluated professional journals, and is an award-winning speaker. Lisa and her husband Mike enjoy bike riding, watching movies, and traveling.
Malcolm Shore is a cybersecurity expert who spent ten years as a director at New Zealand's GCSB.
Dr. Shore was the principal security officer at the Australian National Broadband Network Company and the director of education and community relations for the Australian Information Security Association. He's currently a technical director at BAE Systems Applied Intelligence, and an educator in the fields of forensics, information warfare, security management, and applied cryptography. He holds a PhD in information security.
Daniel Lachance is a consultant, trainer, author, and editor at Lachance IT Consulting Inc.
A highly motivated and passionate IT evangelist, Daniel has over 20 years of experience implementing and supporting a wide variety of hardware and software. His skills include system administration, technical IT training, and planning and implementing technology solutions related to networking.
Jungwoo Ryoo teaches IT, cyber security, and risk analysis at Penn State.
Jungwoo is a professor of information sciences and technology (IST) at the Pennsylvania State University (Altoona College). He is also a graduate and affiliated faculty member of the College of Information Sciences and Technology at Penn State, and a tenured faculty member of the B.S. degree program in security and risk analysis at Penn State Altoona.
Sandra Toner is a certified technical trainer (CTT+) who teaches cyber security and IT.
Sandra Toner is a certified technical trainer (CTT+) who teaches about software, cyber security, and information assurance. She is fluent in several programming languages along with English and Spanish. She holds a Project Management Professional certification as well as a certificate in open-source intelligence analysis. Since 2003, she has taught in post-secondary education, facilitated computer security and compliance training for the federal government, and provided training for international law enforcement. She is a member of the Women's Security Society, and likes to get involved in some of the fun challenges hosted by the National Institute for Standards and Technology (NIST). She was raised like a gypsy, traveling throughout Central and South America. Sandra also teaches courses in CPR/AED and international travel safety.