Introduction to IT Security

This course is part of multiple programs. Learn more

Instructor: Shadow Farrell

What you'll learn

  •   Students will learn about security and risk management, IAM, cryptography, vulnerability management, and incident response.
  • Skills you'll gain

  •   Threat Detection
  •   Identity and Access Management
  •   Vulnerability Assessments
  •   Incident Response
  •   Hardening
  •   Security Management
  •   Penetration Testing
  •   Network Security
  •   Firewall
  •   Disaster Recovery
  •   Vulnerability Scanning
  •   Wireless Networks
  •   Public Key Infrastructure
  •   Encryption
  •   Risk Management Framework
  •   Endpoint Security
  •   Cybersecurity
  •   Mobile Security
  •   Authentications
  • There are 9 modules in this course

    Upon completing this course, you’ll be able to: ● Understand the security management process ● Harden endpoint devices including mobile and IoT devices ● Manage incident responses effectively and plan for business continuity ● Implement network security including firewalls, IDS/IPS, wireless security, remote access, and cloud computing Throughout this course, hands-on labs will enable you to apply security concepts to real-world scenarios. These range from practicing the application of security to networks, hacking simulations, to forensic simulations. At the end of this course, you’ll complete a capstone project, allowing you to showcase the knowledge and skills you learned throughout the course.

    Authentication and Account Management

    Device Security

    Encryption

    Network Security

    Security Management

    Security Threats

    Managing Security Incidents

    Capstone

    Explore more from Security

    ©2025  ementorhub.com. All rights reserved