Course Summary

This IT Specialist Cybersecurity course is designed to kick-off your learning journey in information technology and cybersecurity. This course will improve your understanding of key security paradigms, terminology, and mindset.

The goal of the course is to build the skills and knowledge you need to pass the Cybersecurity exam — including text explanations, video demos, lab activities, self-assessment questions, and a practice exam.

Whatever your current IT skill level, this course can help improve your chances of passing the exam on the first try and becoming a certified IT Specialist Cybersecurity.

Successful candidates will have a keen awareness of the importance of security and the threats to a business when security procedures are not followed. They are developing the investigative and implementation skills necessary to succeed in the field and have an aptitude and desire to learn more and a willingness to teach others. They are familiar with the toolset at a fundamental level and can assist in threat mitigation and incident response.

Methodology:

180-day access to:

  • Lessons
  • Video learning
  • MeasureUp Practice Test for IT Specialist INF-105. Practice Mode with remediation and Certification mode to simulate the test day experience.

Duration:  32 hours 

Course Outline:

  • Lesson 1: Essential Security Principles, Incomplete section
    • Skill 1: Define essential security principles.
    • Skill 2: Explain common threats and vulnerabilities.
    • Skill 3: Explain access management principles.
    • Skill 4: Explain encryption methods and applications.
  • Lesson 2: Basic Network Security Concepts
    • Skill 1: Describe TCP/IP protocol vulnerabilities.
    • Skill 2: Explain how network addresses impact network security.
    • Skill 3: Describe network infrastructure and technologies.
    • Skill 4: Set up a secure wireless SoHo network.
    • Skill 5: Implement secure access technologies.
  • Lesson 3: Endpoint Security Concepts
    • Skill 1: Describe operating system security concepts.
    • Skill 2: Demonstrate familiarity with appropriate endpoint tools that gather security assessment information.
    • Skill 3: Verify that endpoint systems meet security policies and standards.
    • Skill 4: Implement software and hardware updates.
    • Skill 5: Interpret system logs.
    • Skill 6: Demonstrate familiarity with malware removal.
  • Lesson 4: Vulnerability Assessment and Risk Management, Incomplete section
    • Skill 1: Explain vulnerability management.
    • Skill 2: Use threat intelligence techniques to identify potential network vulnerabilities.
    • Skill 3: Explain risk management.
    • Skill 4: Explain the importance of disaster recovery and business continuity planning.
  • Lesson 5: Incident Handling, Incomplete section
    • Skill 1: Monitor security events and know when escalation is required.
    • Skill 2: Explain digital forensics and attack attribution processes.
    • Skill 3: Explain the impact of compliance frameworks on incident handling.
    • Skill 4: Describe the elements of cybersecurity incident response.