Secure your IT Systems & Network: For Sys Admins + Engineers
- Description
- Curriculum
- FAQ
- Reviews
As technology continues to advance, so do the cyber threats that target our systems and networks. System administrators play a critical role in securing their organizations’ digital assets, and it’s essential for them to have a solid understanding of cybersecurity principles and best practices.
This course is designed specifically for system administrators who want to enhance their cybersecurity knowledge and skills. In this course, you will learn the essential principles and techniques to secure your organization’s systems and networks against cyber threats.
We will cover a broad range of topics, including network security, operating system security, authentication and access control, vulnerability management, incident response, encryption and cryptography, web application security, mobile device security, and compliance and regulations. You will learn about the latest threats and attacks, including how to detect, prevent, and respond to them effectively.
What we’ll cover:
- Introduction to Cybersecurity: You will learn the basics of cybersecurity, including common terminology, concepts, and the threat landscape.
- Network Security: You will learn how to secure your organization’s network, including firewalls, intrusion detection and prevention systems, and virtual private networks (VPNs).
- Operating System Security: You will learn how to secure operating systems, including Windows and Linux, and best practices for hardening them against cyber threats.
- Authentication and Access Control: You will learn about the importance of strong authentication and access control, including password policies, multi-factor authentication, and role-based access control.
- Vulnerability Management: You will learn how to identify and remediate vulnerabilities in your systems, including vulnerability scanning, patch management, and vulnerability assessment.
- Incident Response: You will learn about incident response, including how to detect, respond to, and recover from cybersecurity incidents.
- Best practices around backups and data recovery: How to structure and setup a robust backup system with cybersecurity in mind.
- Web Application Security: You will learn how to secure web applications, including common vulnerabilities and best practices.
- Mobile Device Security: You will learn about mobile device security, including how to secure mobile applications and mobile device management.
- and much more…
By the end of this course, you will have a solid understanding of cybersecurity essentials and be able to apply them to secure your organization’s systems and networks. You will also be well-prepared to pursue further training in the cybersecurity field.
-
1Becoming a Security ExpertVideo lesson
Becoming a security expert is an essential skill for systems administrators to ensure the security and integrity of their organization's data and systems. This topic covers the necessary knowledge, skills, and best practices to develop a comprehensive security strategy, including risk assessment, vulnerability management, incident response, and compliance.
-
2Security Devices for Sys AdminsVideo lesson
The topic of security devices is critical for cybersecurity professionals to understand. This topic covers firewalls, intrusion detection and prevention systems, VPNs, and other devices used to protect against cyber attacks. Participants will learn how to implement, manage, and optimize these devices to safeguard their organization's network infrastructure.
-
3Networking Protocols and StandardsVideo lesson
Understanding networking protocols and standards is essential for any cybersecurity professional. This topic delves into the communication protocols and standards that enable secure and efficient data transfer between devices and networks, including TCP/IP, DNS, HTTP, and more.
-
4Cybersecurity Threats and AttacksVideo lesson
Understanding threats and attacks is crucial for any cybersecurity professional. This topic covers the different types of threats and attacks, including malware, phishing, social engineering, and more, and provides strategies for preventing and mitigating these threats to protect an organization's network and data.
-
5MalwareVideo lesson
Malware is a significant threat to the security of computer systems and networks. In this topic, participants will learn about different types of malware, such as viruses, Trojans, and ransomware, as well as methods for detecting, removing, and preventing malware infections.
-
6Social EngineeringVideo lesson
Social engineering is a tactic used by cybercriminals to manipulate people into divulging sensitive information or taking actions that compromise security. In this topic, participants will learn about the different types of social engineering attacks, such as phishing and pretexting, and strategies for identifying and preventing these attacks.
-
7Phishing AttacksVideo lesson
Phishing is a type of social engineering attack that aims to trick individuals into revealing sensitive information, such as login credentials or financial data. This topic explores the different forms of phishing attacks, how to identify them, and best practices for protecting against phishing attempts.
-
8DDoSVideo lesson
A Distributed Denial of Service (DDoS) attack is a type of cyber attack that aims to overwhelm a server, website, or network with traffic, rendering it unavailable to users. In this topic, participants will learn about the different types of DDoS attacks, how they are carried out, and strategies for mitigating their effects.
-
9How to Protect Your Systems and DataVideo lesson
Protecting your systems and data is crucial to safeguarding your organization's intellectual property, customer information, and reputation. This topic covers a range of measures and best practices for securing networks, devices, and data, including encryption, access control, backup and recovery, and incident response planning.
-
10Passwords Structure and RecommendationsVideo lesson
Creating strong passwords is a critical component of cybersecurity. In this topic, participants will learn about password structures, including length, complexity, and uniqueness, as well as best practices for managing passwords securely to prevent data breaches and unauthorized access.
-
11Multi-Factor AuthenticationVideo lesson
Multi-factor authentication (MFA) is a security mechanism that requires users to provide multiple forms of identification to access a system or application. This topic explores the different types of MFA, such as tokens, and provides guidance on how to implement and manage MFA for enhanced security.
-
12Don't Use These PasswordsVideo lesson
Don't use these passwords whatever you do. This topic covers the most used passwords, and why you should avoid them.
-
13Data EncryptionVideo lesson
Data encryption is a critical technique for securing sensitive information in transit or at rest. This topic explores different encryption methods, such as symmetric and asymmetric encryption, and provides guidance on how to implement and manage encryption to protect data confidentiality, integrity, and availability.
-
14Server Security Top TipsVideo lesson
Servers are critical components of IT infrastructure, and securing them is essential to prevent data breaches, downtime, and other security incidents. This topic covers the different aspects of server security, including access control, hardening, patch management, and monitoring, and provides best practices and strategies for protecting servers from various security threats.
-
15Physical Server SecurityVideo lesson
-
16Network Security 101Video lesson
We'll give you in this video some high-level tips on how to improve the security of your network, and hardware systems.
-
17FirewallsVideo lesson
A firewall is a security tool that acts as a barrier between a private network and the public internet, filtering incoming and outgoing network traffic based on a set of predefined security rules. Firewalls are an essential component of network security and help to protect against unauthorized access, malware infections, and other cyber threats.
-
18Network Whitelists and BlacklistsVideo lesson
White and blacklists are used in cybersecurity to control access to resources or block unwanted activities. White lists allow only approved entities or actions, while blacklists prevent access from entities or actions deemed malicious or unauthorized.
-
19Virtual Private Networks (VPN)Video lesson
In the context of cybersecurity training, Virtual Private Networks (VPN) are a crucial tool for maintaining online security and privacy. By using encryption and tunneling protocols, VPNs create a secure and private network connection that enables users to access the internet or other network resources without the risk of exposing sensitive information to potential cyber threats.
-
20Cloud SecurityVideo lesson
Securing the cloud is critical to protect the sensitive data and applications stored and accessed in the cloud. This topic in the cybersecurity training course covers the different security risks associated with cloud computing, including data breaches, insider threats, and compliance issues, and provides strategies and best practices for securing data and applications in the cloud.
-
21WiFi SecurityVideo lesson
Wi-Fi is a ubiquitous technology that enables wireless connectivity and convenience, but it also presents security risks. This topic explores the different security threats associated with Wi-Fi networks, such as eavesdropping and unauthorized access, and provides best practices for securing Wi-Fi networks to protect data and devices.
-
22Using WiresharkVideo lesson
Wireshark is a powerful network analysis tool used for capturing and analyzing network traffic in real-time. This topic covers the basics of Wireshark.
-
23Securing Desktops and LaptopsVideo lesson
Securing desktops and laptops is crucial to prevent data breaches, malware infections, and other security incidents. This topic covers the different security risks associated with desktops and laptops, such as phishing attacks and software vulnerabilities, and provides best practices for securing these devices, such as antivirus software, firewalls, and encryption.
-
24Software Updates, Calendars and SchedulesVideo lesson
Software updates are critical for maintaining the security and stability of computer systems and applications. This topic explores the importance of software updates, the risks of not keeping software up to date, and best practices for managing and deploying software updates efficiently and securely.
-
25macOS SecurityVideo lesson
Securing desktops and laptops, especially those running macOS, is crucial to prevent data breaches, malware infections, and other security incidents. This topic covers the different security risks associated with Macs, such as phishing attacks, software vulnerabilities, and ransomware, and provides best practices for securing these devices, such as enabling FileVault encryption, using anti-malware software, and configuring the built-in firewall.
-
26Encrypting your Hard Drives (Windows 11 and macOS)Video lesson
Encrypting hard disk drives (HDD) on Windows and Mac is an effective way to protect sensitive data from unauthorized access. In this topic, participants will learn about the different encryption methods available for HDDs, such as BitLocker and FileVault, and how to implement and manage HDD encryption for enhanced security.
-
27iPhone SecurityVideo lesson
iPhone security is a critical aspect of mobile device security, as iPhones store and access sensitive data and are vulnerable to various security threats. This topic covers the different security risks associated with iPhones.
-
28iPad SecurityVideo lesson
iPad security is a critical aspect of mobile device security, as iPads store and access sensitive data and are vulnerable to various security threats.
-
29Staying Safe OnlineVideo lesson
-
30Apps & Security: Importance of App MgmtVideo lesson
Getting application maangement right is crucial to ensuring that your environment remains as safe and secure as possible.
-
31Apps & Security: Ensuring SecurityVideo lesson
Application security is a critical aspect of cybersecurity that focuses on securing software applications from different types of cyber threats and vulnerabilities. This topic covers various best practices and techniques for securing applications, such as secure coding practices, vulnerability scanning, and penetration testing, and highlights the importance of continuous monitoring and testing to maintain the security of applications throughout their lifecycle.
-
32Apps & Security: Approved App ListVideo lesson
In the context of approved applications in a company, whitelisting is a critical security measure that enables organizations to maintain control over the software that employees can use. By specifying a list of approved applications, IT departments can prevent employees from downloading and using unauthorized software that could introduce security risks or cause compatibility issues. This topic covers best practices for implementing a whitelisting approach in an organization, including defining and maintaining the list of approved applications, regularly reviewing and updating the list, and educating employees on the importance of adhering to the policy.
-
33Security MonitoringVideo lesson
Monitoring software is used to track the activity on computers, networks, and devices to detect potential security breaches or inappropriate use. This topic covers the benefits of using monitoring software to improve cybersecurity, including detecting insider threats, identifying suspicious activity, and improving compliance with company policies and regulations. It also addresses the ethical and legal considerations involved in monitoring employee activity and the importance of transparency and clear communication with employees.
-
34Log Analysis & ManagementVideo lesson
Log analysis is a critical aspect of cybersecurity that involves reviewing logs from various sources to identify security incidents, troubleshoot issues, and proactively detect potential threats. This topic covers the key concepts of log analysis, including log types, sources, and formats, as well as the importance of log analysis for incident response, compliance, and regulatory requirements. It also covers the tools and techniques used in log analysis, including automated log analysis tools, machine learning, and artificial intelligence.
-
35Incident ResponseVideo lesson
Incident response is the process of detecting, analyzing, and containing security incidents to minimize the impact of security breaches on an organization. This topic covers the key components of incident response, including incident classification, severity assessment, escalation, and communication, as well as the best practices for developing and implementing an incident response plan. It also covers the tools and techniques used in incident response, including forensics, malware analysis, and threat intelligence.
-
36Backups at WorkVideo lesson
Backups and disaster recovery are critical in cybersecurity because they provide a way to restore systems and data in the event of a security incident or disaster, such as a ransomware attack, natural disaster, or hardware failure. Without proper backups and DR plans in place, organizations risk losing valuable data, facing extended downtime, and potentially even going out of business.
-
37Backup Types (Incremental, Differential, Full)Video lesson
This topic covers the different types of backup strategies commonly used in cybersecurity, including incremental, full, and differential backups. Understanding the pros and cons of each approach can help organizations develop a backup strategy that meets their specific needs and requirements.
-
38The 3-2-1 RuleVideo lesson
We'll explore the 3-2-1 rule in backups and its significance in data protection. We'll explain the rule's three key principles: having at least three copies of your data, storing the copies on two different media types, and keeping one copy off-site. We'll discuss the rationale behind each principle and how they collectively ensure resilience against various threats, such as hardware failures, natural disasters, and cyberattacks.
-
39Immutable BackupsVideo lesson
In this video, we'll delve into the concept of immutable backups and their significance in data protection. We'll explore what makes backups immutable, emphasizing the importance of preserving data integrity and preventing unauthorized alterations or deletions. Additionally, we'll discuss the benefits of immutable backups in mitigating ransomware attacks and ensuring regulatory compliance.
-
40Retention PeriodsVideo lesson
In this video, we'll discuss backup retention periods and their importance in data management. We'll explore the factors to consider when determining appropriate retention periods, such as regulatory requirements, business needs, and recovery objectives.
-
41Security AuditsVideo lesson
Cybersecurity audits are a crucial aspect of ensuring the security and integrity of an organization's information systems. These audits provide an independent and objective assessment of an organization's cybersecurity posture, identifying vulnerabilities and potential threats that need to be addressed to protect against cyber attacks.
-
42Role of a PenTester (Ethical Hackers)Video lesson
Cybersecurity penetration testing, also known as pen testing, is a method used to identify security vulnerabilities in an organization's computer systems, networks, and applications. It involves simulating a cyber attack to test the security defenses and identify weaknesses that can be exploited by attackers.
-
43Penetration Tester EngagementVideo lesson
Engaging a pentester, or penetration tester, is an important step in identifying security vulnerabilities in a system. By simulating real-world attacks, pentesters can help organizations identify weaknesses in their security posture and develop strategies to mitigate potential threats.
External Links May Contain Affiliate Links read more