Cybersecurity in 90 Minutes

This course aims to point out the security essentials for any given IT organization. The course enables students to setup a secure base from scratch or review an existing security skeleton for their I...
created by Mohammad Adly
Last updated 2022-04-29
Language: English
Share
$20
$40
Buy Now
30 days money back guarantee
This course has
Full Lifetime Access
Access on mobile
Certificate of Completion

Your Coverages

  • This course aims to point out the security essentials for any given IT organization. The course enables students to setup a secure base from scratch or review an existing security skeleton for their IT environments

    Course Requirements

  1. IT Basics

    Which Students must take this course

  1. The course targets the IT security beginners as well as professionals to enrich their knowledge about cyber security and to pursue their career in such field

Course Content

Securing Passwords
00:09:18
Securing Operating Systems
00:09:30
Firewalls
00:10:51
Securing Switches
00:08:46
Securing Routers
00:07:42
Securing Wireless Networks
00:09:23
IDS, IPS, and Honeypots
00:10:51
Antiviruses
00:08:58
Encryption
00:05:07
Physical Security
00:07:04

Description

This course aims to point out the security essentials for any given IT organization. The course enables students to setup a secure base from scratch or review an existing security skeleton for their IT environments. The course targets the IT security beginners as well as professionals to enrich their knowledge about cyber security and to pursue their career in such field. The course material is based on my understanding of several IT security curricula such as SANS, CEH, etc.. The course is meant to be brief to fit security specialists, IT admins, and developers It is imperative that all of any organization personnel be trained on the proper cybersecurity procedures. Staff should be aware of potential cyber interference or hacking attempts, and this is what is offered in this course as awareness and knowledge. Many times cyber threats come from partners within your supply-chain network. In order to increase efficiency in the logistics industry, you and those in your network must access shared online platforms. Therefore, you need to be cognizant of new vulnerabilities that may arise. Even though you cannot control others’ security measures, you can choose to work with partners that conduct regular security audits or have external security certifications. You could also devise a contract that requires your partners to adhere to basic cybersecurity measures and that is what this course tries to help you to plan and figure out the right way to do.

Instructor Profile

Mohammad Adly
Mohammad Adly
Ph. D. Computer Networks & Cybersecurity
Lecturer of Computer Networks and Cybersecurity for more than 20 years
$20
$40
Buy Now
30 days money back guarantee
This course has
Full Lifetime Access
Access on mobile
Certificate of Completion
total time 01:27:34
Message 1 sec ago
URL has been copied
whatsapp