Description
As technology continues to advance, so do the cyber threats that target our systems and networks. System administrators play a critical role in securing their organizations’ digital assets, and it’s essential for them to have a solid understanding of cybersecurity principles and best practices.
This course is designed specifically for system administrators who want to enhance their cybersecurity knowledge and skills. In this course, you will learn the essential principles and techniques to secure your organization’s systems and networks against cyber threats.
We will cover a broad range of topics, including network security, operating system security, authentication and access control, vulnerability management, incident response, encryption and cryptography, web application security, mobile device security, and compliance and regulations. You will learn about the latest threats and attacks, including how to detect, prevent, and respond to them effectively.
What we’ll cover:
- Introduction to Cybersecurity: You will learn the basics of cybersecurity, including common terminology, concepts, and the threat landscape.
- Network Security: You will learn how to secure your organization’s network, including firewalls, intrusion detection and prevention systems, and virtual private networks (VPNs).
- Operating System Security: You will learn how to secure operating systems, including Windows and Linux, and best practices for hardening them against cyber threats.
- Authentication and Access Control: You will learn about the importance of strong authentication and access control, including password policies, multi-factor authentication, and role-based access control.
- Vulnerability Management: You will learn how to identify and remediate vulnerabilities in your systems, including vulnerability scanning, patch management, and vulnerability assessment.
- Incident Response: You will learn about incident response, including how to detect, respond to, and recover from cybersecurity incidents.
- Best practices around backups and data recovery: How to structure and setup a robust backup system with cybersecurity in mind.
- Web Application Security: You will learn how to secure web applications, including common vulnerabilities and best practices.
- Mobile Device Security: You will learn about mobile device security, including how to secure mobile applications and mobile device management.
- and much more…
Course Length
6hr 17min of instructor led video content along with handouts to aid learning.
By the end of this course, you will have a solid understanding of cybersecurity essentials and be able to apply them to secure your organization’s systems and networks. You will also be well-prepared to pursue further training in the cybersecurity field.
Course Outline
- Let’s Get Started
- Becoming a Security Expert
- Security Devices for Sys Admins
- Network Protocols and Standards
- Common Threats
- Threat and Attack Types
- Malware
- Phishing
- DDoS
- Social Engineering
- Identity and Access Management
- Protecting Your Systems | Top Tips
- Passwords Structure and Recommendations
- Don’t Use These Passwords
- Multi-Factor Authentication
- Data Encryption
- Securing Servers
- Server Security Top Tips
- Physical Security
- Securing Networks
- Network Security 101
- Firewall Security
- Virtual Private Networks (VPN)
- Whitelists and Blacklists (Web Filtering)
- WiFi Security
- Cloud Security
- Using WireShark
- Securing Computers + Portables
- Securing Desktops and Laptops
- Software Updates, Calendars and Schedules
- macOS Security
- Windows and Mac Hard Drive Encryption
- iPhone Security
- iPad Security
- Tips to Stay Safe Online
- Securing Applications
- Apps & Security – Importance of App Mgmt
- Apps & Security – Approved App List
- Apps & Security – Ensuring Security
- Monitoring and Incident Response
- Security Monitoring
- Log Management
- Incident Response
- Importance of Backups
- Backups at Work
- Backup Types (Incremental, Differential, Full)
- The 3-2-1 Rule
- Immutable Backups
- Retention Periods
- Testing your Systems
- Security Audits
- Role of a PenTester (Ethical Hackers)
- Penetration Tester Engagement
- Becoming an Expert
- Cybersecurity Certifications
- Cybersecurity Awareness and Training
- What’s Next…??