Cybersecurity Administration

The Cybersecurity Administration skills path covers a variety of high-level tasks related to cybersecurity, including implementing identity and access management, understanding asset security, integrating enterprise security, performing assessments and more.

Course

Risk Metric Scenarios

12 minutes

Course

Vulnerability Assessment Methods and Tools

21 minutes

Course

Software Vulnerabilities and Security Controls

37 minutes

Course

Integrating Cloud and Virtualization Technologies

33 minutes

Course

Integrating Hosts, Storage, Networks and Applications

28 minutes

Course

Incident Response and Recovery Procedures

16 minutes

Course

Integrating Authentication and Authorization Technologies

22 minutes

Course

Implementing Cryptographic Techniques

30 minutes

Course

Securing Communications and Collaboration Solutions

14 minutes

Course

Asset Security

39 minutes

Here are two questions everyone will eventually need to ask themselves: What do I have, and where is it? This seven-video course gives the student the tools to answer those questions by taking them through the minutiae of asset security. Beginning with managing sensitive data and basic principles such as need-to-know and definitions of important terms (quality control and assurance, data owner, data custodian and more), we conduct a deeper dive into six key topic areas: data remanence, data at rest, data in transit, data ownership, data security controls and classification.

Course

Risk Mitigation Strategies and Controls

26 minutes

Course

Business and Industry Influences and Risks

15 minutes

Course

Security Assessment

20 minutes

This course looks at three important parts of security assessment: goals, control testing and collecting, analyzing and reporting security data. In four videos, students will be introduced to the ins and outs of penetration testing: testing a system from an attacker’s point of view, monitoring a system’s vulnerabilities, planning for and performing a test, the Rules of Engagement when attacking a client’s system, the nitty-gritty of security auditing and more. Every system has a weakness, and sometimes, it’s your job to find it before your enemies do.

Course

Access Control Fundamentals

1 hour, 37 minutes

Twenty-two videos cover everything you want to know about access control fundamentals. Beginning with access control basics (definitions and subject-object relationships), we move on to access control categories, authentication, account management, Single Sign-On (SSO) and Kerberos, the three forms of user authentication and the arguable fourth form, remote authentication services and much more. This is a complex subject, but our Access Control Fundamentals course dives deep and dredges up the answers for you.

Course

Secure Network Design

26 minutes

Securing a network is a lot like securing a building: there are many possible protection mechanisms, and even more possible ways for the intruder to get in. In this course, six videos take the student through the essentials of secure network design. From firewalls and the so-called demilitarized zone (DMZ) to honeypots, honeytokens and honeynets, endpoint security and the many flavors of authentication protocol, learn to identify the potential chinks in a system’s armor — and how to make them secure.

Course

WAN & Remote Access Security

33 minutes

When it comes to wireless networks and remote access security, there are several threats you need to be on the lookout for. Bluesnarfing, Man-in-the-Middle attacks and the dangers of obsolete protocols are just a few. In this five-video course, the student will review WAN and remote access security: wireless networks, mobile systems, WAN technologies, remote access and secure communication protocols. This course also includes diagrams, vocabulary, definitions, protocol lists and examples.

Course

Network Fundamentals

1 hour, 20 minutes

Review everything you ever needed to know about network fundamentals with this fourteen-video course. Beginning with OSI (Open Systems and Interconnection) protocols and layers, this course explores the TCP/IP model, network devices and security, IP networking, multi-layer protocols, Dynamic Host Configuration Protocol (DHCP), network cabling and topology, signaling types and much more. Take a closer look at switched and permanent virtual circuits, or find out what DORA or POTS stands for. It’s all here!