Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Introduction to Cybersecurity

Exclusive – Learn the importance of cybersecurity in information technology.

GK# 4277

Course Overview

TOP

In this course, you will discover the importance of cybersecurity in information technology. The objective is to understand cyber-attacks and the techniques used to take control of an unsecure system. This course also presents the defensive measures security teams can take to prevent attacks, and provides an overview of the malicious software types used in computer networks.

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

What You'll Learn

TOP
  • Definition of security
  • The CIA triad
  • Security terminology
  • Risks
  • Security vs. usability

Outline

TOP
Viewing outline for:

GK Digital Learning Outline

  1. Network Components
  2. Resource Discovery and Tools
  3. Attack Vectors
  4. Port Scanning
  5. Vulnerabilities
  6. Ports and Vulnerability Scanners
  7. Privilege Escalation
  8. Malware Types
  9. Protection Mechanisms and Countermeasures

Prerequisites

TOP
  • Basic understanding of networking terminology and applications, intranet and internet services, protocols, ports, as well as networking and security devices
  • Basic knowledge in installation of security software, such as antivirus or firewalls, and general understanding of operating systems functionalities (Windows and Linux)

Who Should Attend

TOP
  • IT professionals who are interested in learning the main principles of cybersecurity and computer-based attacks
  • Team leaders and managers interested in understanding the terminology and possibilities in cybersecurity
  • System administrators requested to integrate security components in their networks
  • Individuals that would like to get a better understanding of cybersecurity fundamentals acquired previously
  • Consultants looking for solutions in security assessments for organizations

Follow-On Courses

TOP
Course Delivery

This course is available in the following formats:

GK Digital Learning

Experience high-quality online learning combined with reliable expert guidance and skills development activities.



Request this course in a different delivery format.
Enroll