Networking

LM108 Core Concepts of IT Security Foundations (LM108)


Description
Computing and Internet security are everyone's business, but it's especially critical for information technology specialists. Learning the core concepts of operating-system and network-level security helps avoid ongoing threats and eliminate system vulnerabilities. This beginner-level course covers core security concepts and introduces risks such as social engineering, malware, and spyware. Foundations of IT Security will also cover some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption.
Content
  • LM108.1 Core Security Principles
  • LM108.1.1 Introduction to CIA triad.mp4
  • LM108.1.2 Evaluate threats risks and vulnerabilities.mp4
  • LM108.1.3 Principle of least privilege.mp4
  • LM108.1.4 Social Engineering.mp4
  • LM108.1.5 Minimize attack surface.mp4
  • Feedback - LM108.1
  • LM108.2 Spyware, Malware, Worms and Viruses
  • LM108.2.1 Buffer Overflow.mp4
  • LM108.2.2 Avoid viruses and worms.mp4
  • LM108.2.3 Trojans.mp4
  • LM108.2.4 Protect system from spyware.mp4
  • Feedback - LM108.2
  • LM108.3 Browser Security
  • LM108.3.1 Modify Browser Settings.mp4
  • LM108.3.2 Navigate Security Zones.mp4
  • LM108.3.3 Recognise secure website.mp4
  • Feedback - LM108.3
  • LM108.4 Wireless Security Basics
  • LM108.4.1 Securing Wireless Transmission.mp4
  • LM108.4.2 Understand PSK authentication.mp4
  • LM108.4.3 Filter SSIDs and MAC addresses.mp4
  • Feedback - LM108.4
  • LM108.5 Encryption Role in Security
  • LM108.5.1 Encryption and cryptographic techniques.mp4
  • LM108.5.2 Differentiate between public and private key encryption.mp4
  • LM108.5.3 Build PKI certificate services infrastructure.mp4
  • LM108.5.4 Encrypting files folders and drives.mp4
  • LM108.5.5 Secure Email.mp4
  • LM108.5.6 Virtual private networks.mp4
  • Course Feedback
Completion rules
  • All units must be completed
  • Leads to a certification with a duration: Forever