This course gives you the background needed to understand basic network security. You will learn the about Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization. You will learn the network components that guard an organization from cybersecurity attacks. In addition to networking, you … [Read more...] about Network Security & Database Vulnerabilities
Security
Introduction to Cloud Identity
Introduction to Cloud Identity serves as the starting place for any new Cloud Identity, Identity/Access Management/Mobile Device Management admins as they begin their journey of managing and establishing security and access management best practices for their organization. This 15-30 hour accelerated, one-week course will leave you feeling confident to utilize the basic … [Read more...] about Introduction to Cloud Identity
Introduction to Cybersecurity Foundations
Most introductory or beginner level cybersecurity courses are not truly beginner level. Most of them assume some level of technical competence and expect that cybersecurity is not your first technical job role. However, as I've successfully mentored people coming from fields such as nursing, aviation (an airline pilot!), and real estate, I've learned that these people are … [Read more...] about Introduction to Cybersecurity Foundations
Windows OS Forensics
The Windows OS Forensics course covers windows file systems, Fat32, ExFat, and NTFS. You will learn how these systems store data, what happens when a file gets written to disc, what happens when a file gets deleted from disc, and how to recover deleted files. You will also learn how to correctly interpret the information in the file system data structures, giving the student … [Read more...] about Windows OS Forensics
Managing Network Security
Almost every organization uses computer networks to share their information and to support their business operations. When we allow network access to data it is exposed to threats from inside and outside of the organization. This course examines the threats associated with using internal and external networks and how to manage the protection of information when it’s … [Read more...] about Managing Network Security