Security Fundamentals

Overview

In this series the learner will be introduced to concepts in cybersecurity, such as the core principles of security, wired and wireless network security. The learner will explore topics like operating system security and security software and more.
Security Fundamentals Overview
Clock icon0h 3m
>> THANK YOU SO MUCH FOR JOINING US. I'M YOUR HOST LAUREN DEAL AND I'LL BE YOUR LEARNER ADVOCATE AS WE GO ALONG. BUT IT IS SUCH AN EXCITING MOMENT TO INTRODUCE WES, BRYAN. HE'S GOING TO BE OUR SUBJECT MATTER EXPERT WES. TELL US A LITTLE BIT. >> YOURSELF. ABSOLUTELY. SO, YOU KNOW, I'VE BEEN TEACHING TECHNICAL COURSES NOW IN JUST A TECHNICAL TRAINING FOR A LITTLE BIT OVER A DECADE. NOW. I HAVE VARIOUS CERTIFICATIONS, CERTIFICATIONS AND COMPTIA LAND, MICROSOFT LAND THAT CERTIFICATION IN LENOX AS WELL. AND I REALLY, REALLY ENJOYED TEACHING, YOU KNOW, A VARIETY OF USER, THE USER'S. LET'S TRY A VARIETY OF YOU VIEWERS, RIGHT? I TAUGHT IT IN A TRADITIONAL MANNER. I'VE DONE ONLINE TRAINING IN SUBSCRIPTION BASED SERVICES LIKE YOU SEE RIGHT NOW. SO I'M REALLY LOOKING FORWARD TO BRINGING SOME OF THAT INFORMATION THAT WE HAVE A SHARE, YOU KNOW, SECURITY FUNDAMENTALS COURSE TO YOU, THE VIEWER. >> WELL, WES SIDE TO SAY THAT BE LEARNING AS WE GO ALONG AS WELL. I'M NEW TO SECURITY AND SO BE ASKING ALL THE QUESTIONS THAT YOU MAY HAVE AT HOME FOLLOWING ALONG WITH THE NOTES THAT IN OUR NOTE AND LERNER SECTION. AND SO YOU CAN BE KIND OF FOLLOW ALONG LESS SO WES GOING TO ASK WHAT'S >> I'M GOING ON IN THIS COURSE WHICH WE EXPECT. ALL RIGHT. SO HERE IN SECURITY FUNDAMENTALS, WHAT WE'RE GOING TO BE DOING IS REALLY JUST GIVING YOU AN INTRODUCTION INTO THE ROUND OF SECURITY. WE'RE GOING TO TAKE SOME OF THE COMMON SECURITY CONCEPTS, THE CORE PRINCIPLES OF SECURITY. AND MAKE YOU AWARE OF THAT. WE'RE GOING TO LOOK AT NETWORKS. WE'RE GOING TO NOT JUST LOOK AT NETWORK SECURITY. WE'RE GOING TO LOOK AT OUR SERVICE AND HOW WE CAN KEEP THEM SECURE. WE'RE GOING TO LOOK AT PROTOCOLS HOW WE CAN KEEP THINGS LIKE PROTOCOL, SECURE ALL OF A VARIETY OF DIFFERENT TECHNIQUES AND TECHNOLOGIES, IMPLEMENTATIONS AND CONCEPTS ALL SURROUNDING THE WORLD OF CYBER SECURITY. ALL HERE IN THIS COURSE. WELL, I'M EXCITED TO GET STARTED. BUT WHO IS THIS COURSE FOR WHO WOULD BE THE PERFECT AUDIENCE? ALL RIGHT. THIS COURSE IS REALLY JUST GEARED TOWARDS ANYBODY THAT WANTS TO LEARN A LITTLE BIT MORE ABOUT SOME OF THE, YOU KNOW, THE CONCEPTS AND SECURITY YOU DON'T HAVE TO. I'M REALLY HAVE ANY BACKGROUND AND SECURE. MAYBE YOU'RE MAYBE YOU'RE THINKING ABOUT GETTING INTO IT MAY BE YEARS SAYING, HEY, I WANT TO GET IN TO HELP. THIS MAY BE ALREADY AND HELP DESK AND YOU WANT TO KNOW A LITTLE BIT MORE ABOUT SECURITY OR MAYBE YOU'RE IN A NEWSROOM SAY GONE THROUGH THE END, USER AWARENESS, SECURITY AWARENESS, TRAINING. AND I JUST DON'T UNDERSTAND WHY WE HAVE TO DO SOME OF THIS. AND I WOULD LIKE TO KNOW A LITTLE BIT MORE ABOUT IT. >> WELL, THIS IS THE COURSE FOR YOU. OH, THIS IS PERFECT, BECAUSE I KNOW THAT I'VE BEEN WANTING TO KIND OF KICK START MY SECURITY KNOWLEDGE BASE. AND SO THIS IS THE PERFECT PLACE FOR ME AS WELL. BUT I'M CURIOUS WHAT KIND OF STRUCTURE? >> IS THIS COURSE CAN BE LIKE WHAT IS WHAT WE EXPECT. ALL RIGHT. WELL, YOU AND I ARE GOING TO TAKE THE VIEWER THROUGH A JOURNEY ON THESE CONCEPTS. AND WHAT WE'RE GOING TO DO IS WE'RE GOING TO USE A VARIETY OF DISCUSSION. WE'RE GOING TO USE SOME THINGS THAT ARE DYING DRAMATIC, AND WE'RE GOING TO HOPE TO THAT. WE'RE ALSO GOING TO USE SOME HANDS-ON DEMONSTRATIONS AND WE ARE GOING TO LEAVE THOSE LEARN. SHE LEARNED, LORI, HER JUST TOUCHED ON THOSE. WE'RE GOING TO HAVE SOME OF THE INFORMATION WITHIN THE LEARNED SO THAT IF YOU WANT TO GO A LITTLE BIT FARTHER, THAT MAY BE SOME OF THE INFORMATION THAT WE'VE HEARD HERE IN THE COURSES IN THE INDIVIDUAL EPISODES. YOU CAN TAKE YOUR TRADING A LITTLE BIT FARTHER AND THOSE NOTES WILL BE AVAILABLE TO YOU TO DOWNLOAD SO THAT YOU CAN FOLLOW ALONG, INCLUDING SOME OF THE LAB DEMOS THAT I DO WILL PUT SOME OF THE STEP-BY-STEP SUN THERE SO THAT YOU'VE GOT YOUR OWN COMPUTER. YOU CAN FOLLOW ALONG AT HOME, JUST, YOU KNOW, JUST TO SAY. >> OH, MY GOSH. ALL RIGHT. LET'S NOT WASTE ANY MORE TIME. LET'S JUMP INTO THE FIRST EPISODE AND LET'S GET STARTED

Learning Style

On Demand

Length of course

7h 2m
22 Episodes

Here are the topics we'll cover

  • Security Layers
  • Operating System Security
  • Network Security
  • Security Software
Learning Options

Options for this course

Train your team
Stay ahead of the curve and future-proof your business with training programs designed for you.
Channel & Reseller
Transform your experience and integrate with our unique evolving library of Audit, Cybersecurity, and Information Technology courses.
Individual learners
Learn at your own pace and get your certification training.