Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Introduction to Cybersecurity

Exclusive – Learn the importance of cybersecurity in information technology.

GK# 4277

Course Overview

TOP

In this training course, you will discover the importance of cybersecurity in information technology. The objective is to understand cyber-attacks and the techniques used to take control of an unsecure system. This course also presents the defensive measures security teams can take to prevent attacks, and provides an overview of the malicious software types used in computer networks.

I took "Introduction to Cybersecurity" to update my basic knowledge of cybersecurity. I took a mini course years ago when cybersecurity wasn’t as big a deal. This course made me realize how critical it is to an organization. The lab environment was put together really well. Each section has questions that really encourage you to try it for yourself first and then confirm your solution. Also, the script and step by step guide were on point. I’ve even shown my coworkers a few tips I learned in the course.

Osly S. -
Support Engineer

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

What You'll Learn

TOP
  • Definition of security
  • The CIA triad
  • Security terminology
  • Risks
  • Security vs. usability

Outline

TOP
Viewing outline for:

On-Demand Outline

  1. Network Components
  2. Resource Discovery and Tools
  3. Attack Vectors
  4. Port Scanning
  5. Vulnerabilities
  6. Ports and Vulnerability Scanners
  7. Privilege Escalation
  8. Malware Types
  9. Protection Mechanisms and Countermeasures

This was the best training on this material I have ever seen. Very easy to understand and loved the interactive exercises.

Trent B. -
Emerging Technologies Rep.

Prerequisites

TOP
  • Basic understanding of networking terminology and applications, intranet and internet services, protocols, ports, as well as networking and security devices
  • Basic knowledge in installation of security software, such as antivirus or firewalls, and general understanding of operating systems functionalities (Windows and Linux)

Who Should Attend

TOP
  • IT professionals who are interested in learning the main principles of cybersecurity and computer-based attacks
  • Team leaders and managers interested in understanding the terminology and possibilities in cybersecurity
  • System administrators requested to integrate security components in their networks
  • Individuals that would like to get a better understanding of cybersecurity fundamentals acquired previously
  • Consultants looking for solutions in security assessments for organizations

Follow-On Courses

TOP
Course Delivery

This course is available in the following formats:

On-Demand

Train at your own pace with 24/7 access to courses that help you acquire must-have technology skills.

Duration: 6 hours

Request this course in a different delivery format.
Enroll