IT Security Foundations: Core Concepts [Updated: 10/3/2024]
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 36m | 239 MB
Instructor: Lisa Bock
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 36m | 239 MB
Instructor: Lisa Bock
Every day, we interact with our digital devices. At the same time, we’re faced with the threat of cyberattacks that can compromise our privacy and security. Learning the basics of how to secure our digital world will help us avoid becoming victims of a cyberattack. In this beginner-level course, IT Security Foundations series creator Lisa Bock covers basic security concepts.
Learn strategies malicious actors use to gain access to your system using social engineering, malware, and spyware. Dive into some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption. Additionally, find out how to manage cookies when using a browser and discover best practices on how to secure your devices and applications.
Learning objectives
- Explain the main elements of the Confidentiality, Integrity and Availability (CIA) Triad.
- Differentiate between risks, threats and vulnerabilities.
Recognize the different types of malware, and how it can affect a system - Outline strategies malicious actors use to gain access to your system
- Understand how to manage cookies when using a browser.
- Discuss methods to ensure safe browsing habits
- Summarize the various ways to secure your WiFi connection
- Describe ways to conceal and protect your wireless access point (WAP).
- Cite the differences between public and private key encryption.
- Describe best practices to secure your devices and applications.