IT Security Foundations: Core Concepts

Start my 1-month free trial
  • Course details

    Computing and internet security are everyone's business, but it's especially critical for information technology specialists. Learning the core concepts of operating-system and network-level security helps avoid ongoing threats and eliminate system vulnerabilities. These topics are also key components of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). This beginner-level, Windows-based course covers core security concepts and introduces risks such as social engineering, malware, and spyware as it prepares you for exam 98-367. IT Security Foundations series creator Lisa Bock also goes over some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption.

    Instructor

    • Click here to view Lisa Bock’s instructor page

      Lisa Bock

      Author - Ethical Hacking: Penetration Testing

      Since 2004, Lisa Bock has been teaching IT, everything from forensics to network security.

      Lisa is an associate professor in the Information Technology department at Pennsylvania College of Technology, in Williamsport, PA. Courses she has taught during the past 13 years include: networking, security, biometrics, technical support, protocol vulnerabilities (using Wireshark), CCNA Security, and VoIP and Unified Communications. She holds an MS from University of Maryland University College (UMUC) along with numerous other certifications. She has had training in forensics, networking, steganography, and network security. She is involved with various volunteer activities, has evaluated professional journals, and is an award-winning speaker. Lisa and her husband Mike enjoy bike riding, watching movies, and traveling.

    Skills covered in this course

  • Tech savvy, tech safe

    - [Lisa] Everyday we interact with our digital devices to shop, search, bank, and communicate with others. At the same time, we're faced with the threat of cyber attacks that can compromise our privacy and security. By reviewing the effects of malware on a system, we'll see some of the strategies malicious actors use to get into your system. Then we'll take a look at safe browsing techniques and help you decide what type of cookies to accept. We'll finish with an overview of mobile and wireless security and cover some best practices to secure your devices and applications. You'll have a better understanding of how to keep you and your family safe from cyber threats. Hello, I'm Lisa Bock, and I'm a security ambassador. Are you ready? Let's get started.

  • Practice while you learn with exercise files

    Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.

    Download the exercise files for this course. Get started with a free trial today.

  • Download courses and learn on the go

    Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.

    Watch this course anytime, anywhere. Get started with a free trial today.

Contents