Always be learning. Invest in you.
Personalized learning experiences, courses taught by real-world professionals.
Start my 1-month free trial

IT Security Foundations: Core Concepts

Course by: Lisa Bock
IT Security Foundations: Core Concepts Watch preview
  • Course details

    Computing and internet security are everyone's business, but it's especially critical for information technology specialists. Learning the core concepts of operating-system and network-level security helps avoid ongoing threats and eliminate system vulnerabilities. These topics are also key components of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). This beginner-level, Windows-based course covers core security concepts and introduces risks such as social engineering, malware, and spyware as it prepares you for exam 98-367. IT Security Foundations series creator Lisa Bock also goes over some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption.


    • Lisa Bock

      Lisa Bock

      Author - Ethical Hacking: Penetration Testing
      View on LinkedIn

      Since 2004, Lisa Bock has been teaching IT, everything from forensics to network security.

      Lisa is an associate professor in the Information Technology department at Pennsylvania College of Technology, in Williamsport, PA. Courses she has taught during the past 13 years include: networking, security, biometrics, technical support, protocol vulnerabilities (using Wireshark), CCNA Security, and VoIP and Unified Communications. She holds an MS from University of Maryland University College (UMUC) along with numerous other certifications. She has had training in forensics, networking, steganography, and network security. She is involved with various volunteer activities, has evaluated professional journals, and is an award-winning speaker. Lisa and her husband Mike enjoy bike riding, watching movies, and traveling.

      View all courses by Lisa Bock
  • Tech savvy, tech safe

    - [Lisa] Everyday we interact with our digital devices to shop, search, bank, and communicate with others. At the same time, we're faced with the threat of cyber attacks that can compromise our privacy and security. By reviewing the effects of malware on a system, we'll see some of the strategies malicious actors use to get into your system. Then we'll take a look at safe browsing techniques and help you decide what type of cookies to accept. We'll finish with an overview of mobile and wireless security and cover some best practices to secure your devices and applications. You'll have a better understanding of how to keep you and your family safe from cyber threats. Hello, I'm Lisa Bock, and I'm a security ambassador. Are you ready? Let's get started.

  • Download courses and learn on the go

    Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.

    Download on the App Store
    Get it on Google Play
    Watch this course anytime, anywhere. Get started with a free trial today.

Course Contents