Filter Keyword to...

Category: IT Professionals

Results Per Page :
Cryptography has been used for thousands of years to secure messages and hide information from those who would seek to steal it. In this course, you'll learn about cryptographic concepts and techniques along...
[READ MORE]
Cryptography has been used for thousands of years to secure messages and hide information from those who would seek to steal it. In this course, you'll learn about cryptographic concepts and techniques along with examining the security implications associated with enterprise storage. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
Cryptography has been used for thousands of years to secure messages and hide information from those who would seek to steal it. In this course, you'll learn about cryptographic concepts and techniques along with examining the security implications associated with enterprise storage. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
[READ LESS]
Produced by: SkillSoft
The strategic plan that an organization uses is often driven from industry standards and information classification procedures. In this course, you'll interpret business and industry influences and explain...
[READ MORE]
The strategic plan that an organization uses is often driven from industry standards and information classification procedures. In this course, you'll interpret business and industry influences and explain associated security risks. You will also look at risk mitigation planning, strategies, and controls. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
The strategic plan that an organization uses is often driven from industry standards and information classification procedures. In this course, you'll interpret business and industry influences and explain associated security risks. You will also look at risk mitigation planning, strategies, and controls. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
[READ LESS]
Produced by: SkillSoft
Ensuring that departments work in a collaborative fashion is extremely important and will actually increase network security when done properly. In this course, you'll learn about facilitating collaboration...
[READ MORE]
Ensuring that departments work in a collaborative fashion is extremely important and will actually increase network security when done properly. In this course, you'll learn about facilitating collaboration across diverse business units to achieve security goals. You will also look at selecting the appropriate control to secure communications and collaboration solutions. Finally, you will examine security activities across the technology life cycle. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
Ensuring that departments work in a collaborative fashion is extremely important and will actually increase network security when done properly. In this course, you'll learn about facilitating collaboration across diverse business units to achieve security goals. You will also look at selecting the appropriate control to secure communications and collaboration solutions. Finally, you will examine security activities across the technology life cycle. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
[READ LESS]
Produced by: SkillSoft
Creating strong privacy polices and procedures will aid in securing organizational assets. If an event does occur, it is important to have proper procedures in place to make sure that recovery occurs as...
[READ MORE]
Creating strong privacy polices and procedures will aid in securing organizational assets. If an event does occur, it is important to have proper procedures in place to make sure that recovery occurs as quickly and as efficiently as possible. In this course, you'll learn about the policies, procedures, and business documents that are used when creating a secure network environment. You will also examine the incident response and recovery procedures that are used when security breaches occur. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
Creating strong privacy polices and procedures will aid in securing organizational assets. If an event does occur, it is important to have proper procedures in place to make sure that recovery occurs as quickly and as efficiently as possible. In this course, you'll learn about the policies, procedures, and business documents that are used when creating a secure network environment. You will also examine the incident response and recovery procedures that are used when security breaches occur. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
[READ LESS]
Produced by: SkillSoft
Research and testing are the backbone of introducing new technologies and devices into your network. It is important to make sure none of the new changes will compromise network security. In this course,...
[READ MORE]
Research and testing are the backbone of introducing new technologies and devices into your network. It is important to make sure none of the new changes will compromise network security. In this course, you'll learn about research methods to determine industry trends and their impact to the enterprise.You will also explore methods of securing an enterprise environment, and you will select methods or tools appropriate to conduct an assessment and analyze the results. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
Research and testing are the backbone of introducing new technologies and devices into your network. It is important to make sure none of the new changes will compromise network security. In this course, you'll learn about research methods to determine industry trends and their impact to the enterprise.You will also explore methods of securing an enterprise environment, and you will select methods or tools appropriate to conduct an assessment and analyze the results. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
[READ LESS]
Produced by: SkillSoft
Host security plays a tremendously important role in network security. Even if all your network links are secured, improperly secured hosts can leave your organization open to attack. In this course, you'll...
[READ MORE]
Host security plays a tremendously important role in network security. Even if all your network links are secured, improperly secured hosts can leave your organization open to attack. In this course, you'll learn about end point security solutions, security controls and host hardening techniques, boot protection mechanisms, and finally you will learn about securing virtualized and cloud environments. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
Host security plays a tremendously important role in network security. Even if all your network links are secured, improperly secured hosts can leave your organization open to attack. In this course, you'll learn about end point security solutions, security controls and host hardening techniques, boot protection mechanisms, and finally you will learn about securing virtualized and cloud environments. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
[READ LESS]
Produced by: SkillSoft
Tying all the security mechanisms in your organization together is extremely important, as it will bring the overall security into effect. In this course, you'll learn about integrating hosts, storage,...
[READ MORE]
Tying all the security mechanisms in your organization together is extremely important, as it will bring the overall security into effect. In this course, you'll learn about integrating hosts, storage, networks and applications into a secure enterprise architecture. You will also examine ways to integrate advanced authentication and authorization technologies to support enterprise objectives. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
Tying all the security mechanisms in your organization together is extremely important, as it will bring the overall security into effect. In this course, you'll learn about integrating hosts, storage, networks and applications into a secure enterprise architecture. You will also examine ways to integrate advanced authentication and authorization technologies to support enterprise objectives. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
[READ LESS]
Produced by: SkillSoft
Cloud computing and service providers use a range of terms and concepts to characterize their offering. It is important to understand key benefits, concepts, and terminology used to describe the various...
[READ MORE]
Cloud computing and service providers use a range of terms and concepts to characterize their offering. It is important to understand key benefits, concepts, and terminology used to describe the various services. In this course, you'll learn about the different types of cloud services and service models available, as well as the unique characteristics of cloud services and object storage. This course is one in a series of Skillsoft courses in the learning path that covers the objectives for the CompTIA Cloud+ CV0-001 certification exam.
Cloud computing and service providers use a range of terms and concepts to characterize their offering. It is important to understand key benefits, concepts, and terminology used to describe the various services. In this course, you'll learn about the different types of cloud services and service models available, as well as the unique characteristics of cloud services and object storage. This course is one in a series of Skillsoft courses in the learning path that covers the objectives for the CompTIA Cloud+ CV0-001 certification exam.
[READ LESS]
Produced by: SkillSoft
Part of administering a cloud implementation is ensuring that correct resources are available and that users can access them in a timely manner. In this course, you'll focus on managing the cloud provider...
[READ MORE]
Part of administering a cloud implementation is ensuring that correct resources are available and that users can access them in a timely manner. In this course, you'll focus on managing the cloud provider data center, including the allocation and monitoring of physical and virtual resources, the implementation of a disaster recovery and high availability strategy, and the tools provided for remote access of hosts and virtual machines. This course is one in a series of Skillsoft courses in the learning path that covers the objectives for the CompTIA Cloud+ CV0-001 certification exam.
Part of administering a cloud implementation is ensuring that correct resources are available and that users can access them in a timely manner. In this course, you'll focus on managing the cloud provider data center, including the allocation and monitoring of physical and virtual resources, the implementation of a disaster recovery and high availability strategy, and the tools provided for remote access of hosts and virtual machines. This course is one in a series of Skillsoft courses in the learning path that covers the objectives for the CompTIA Cloud+ CV0-001 certification exam.
[READ LESS]
Produced by: SkillSoft
It is important to understand the different security mechanisms that can be implemented to ensure unwanted users cannot access the cloud infrastructure. This course will describe network security concepts and...
[READ MORE]
It is important to understand the different security mechanisms that can be implemented to ensure unwanted users cannot access the cloud infrastructure. This course will describe network security concepts and how to secure information using encryption, access control, and system hardening. This course is one in a series of Skillsoft courses in the learning path that covers the objectives for the CompTIA Cloud+ CV0-001 certification exam.
It is important to understand the different security mechanisms that can be implemented to ensure unwanted users cannot access the cloud infrastructure. This course will describe network security concepts and how to secure information using encryption, access control, and system hardening. This course is one in a series of Skillsoft courses in the learning path that covers the objectives for the CompTIA Cloud+ CV0-001 certification exam.
[READ LESS]
Produced by: SkillSoft
Identifying the different storage options available and how to configure and provision them is important to ensure the correct option is chosen for the environment needs. This is also true of the different...
[READ MORE]
Identifying the different storage options available and how to configure and provision them is important to ensure the correct option is chosen for the environment needs. This is also true of the different networking features offered. This course provides an introduction to the storage and network infrastructure of the data center and outlines configuration and provisioning of its components, including the different networking protocols available and how to troubleshoot and optimize the networks. This course is one in a series of Skillsoft courses in the learning path that covers the objectives for the CompTIA Cloud+ CV0-001 certification exam.
Identifying the different storage options available and how to configure and provision them is important to ensure the correct option is chosen for the environment needs. This is also true of the different networking features offered. This course provides an introduction to the storage and network infrastructure of the data center and outlines configuration and provisioning of its components, including the different networking protocols available and how to troubleshoot and optimize the networks. This course is one in a series of Skillsoft courses in the learning path that covers the objectives for the CompTIA Cloud+ CV0-001 certification exam.
[READ LESS]
Produced by: SkillSoft
An important part of managing a cloud is ensure it is performing optimally. To do this, the network and storage need to be planned out and documented correctly and the VM host needs to be monitored for any...
[READ MORE]
An important part of managing a cloud is ensure it is performing optimally. To do this, the network and storage need to be planned out and documented correctly and the VM host needs to be monitored for any performance issues. In this course you'll learn how to plan and document cloud policies and procedures, as well as how to monitor the VM host for performance issues and perform testing in the cloud. This course is one in a series of Skillsoft courses in the learning path that covers the objectives for the CompTIA Cloud+ CV0-001 certification exam.
An important part of managing a cloud is ensure it is performing optimally. To do this, the network and storage need to be planned out and documented correctly and the VM host needs to be monitored for any performance issues. In this course you'll learn how to plan and document cloud policies and procedures, as well as how to monitor the VM host for performance issues and perform testing in the cloud. This course is one in a series of Skillsoft courses in the learning path that covers the objectives for the CompTIA Cloud+ CV0-001 certification exam.
[READ LESS]
Produced by: SkillSoft
Without the concept of virtualization, large-scale and dynamic cloud computing data centers would not exist to the extent that they do. The ability to have a software layer that pools together underlying...
[READ MORE]
Without the concept of virtualization, large-scale and dynamic cloud computing data centers would not exist to the extent that they do. The ability to have a software layer that pools together underlying physical resources is provided by hypervisors. In this course, you'll explore the concept of hosts and the types of hypervisors they may use. You'll learn about the virtual machine (VM), various virtual resources, and common management tasks required to deploy VMs. You'll also learn about the key benefits of using virtualization. This course is one in a series of Skillsoft courses in the learning path that covers the objectives for the CompTIA Cloud+ CV0-001 certification exam.
Without the concept of virtualization, large-scale and dynamic cloud computing data centers would not exist to the extent that they do. The ability to have a software layer that pools together underlying physical resources is provided by hypervisors. In this course, you'll explore the concept of hosts and the types of hypervisors they may use. You'll learn about the virtual machine (VM), various virtual resources, and common management tasks required to deploy VMs. You'll also learn about the key benefits of using virtualization. This course is one in a series of Skillsoft courses in the learning path that covers the objectives for the CompTIA Cloud+ CV0-001 certification exam.
[READ LESS]
Produced by: SkillSoft
Firewalls are one layer of defense against unauthorized access to networks and hosts. Intrusion detection and prevention can be used to increase security at both the host and network levels. In this course,...
[READ MORE]
Firewalls are one layer of defense against unauthorized access to networks and hosts. Intrusion detection and prevention can be used to increase security at both the host and network levels. In this course, you'll learn about these security mitigations as well as malware and how to use digital forensic tools.
Firewalls are one layer of defense against unauthorized access to networks and hosts. Intrusion detection and prevention can be used to increase security at both the host and network levels. In this course, you'll learn about these security mitigations as well as malware and how to use digital forensic tools.
[READ LESS]
Produced by: SkillSoft
Hiring trustworthy and competent personnel is often overlooked when discussing IT security. Exploits take form not only as technical entities, but also as employee workplace violations. In this course, you'll...
[READ MORE]
Hiring trustworthy and competent personnel is often overlooked when discussing IT security. Exploits take form not only as technical entities, but also as employee workplace violations. In this course, you'll also learn how to monitor and analyze various types of systems for audit and security purposes.
Hiring trustworthy and competent personnel is often overlooked when discussing IT security. Exploits take form not only as technical entities, but also as employee workplace violations. In this course, you'll also learn how to monitor and analyze various types of systems for audit and security purposes.
[READ LESS]
Produced by: SkillSoft
IT security analysis builds upon a solid understanding of underlying network and cloud technologies. Existing IT system implementations must be understood before security controls can be recommended.
IT security analysis builds upon a solid understanding of underlying network and cloud technologies. Existing IT system implementations must be understood before security controls can be recommended.
[READ LESS]
Produced by: SkillSoft
Authentication controls who gets access to resources. Stronger authentication means greater control over resource access. In this course, you will identify weaknesses including conducting vulnerability scans...
[READ MORE]
Authentication controls who gets access to resources. Stronger authentication means greater control over resource access. In this course, you will identify weaknesses including conducting vulnerability scans in order to protect IT assets.
Authentication controls who gets access to resources. Stronger authentication means greater control over resource access. In this course, you will identify weaknesses including conducting vulnerability scans in order to protect IT assets.
[READ LESS]
Produced by: SkillSoft
Assets must be identified before they can be protected. This can come from documentation or IT inventories. Proactive planning streamlines incident response to minimize negative impacts to the organization.
Assets must be identified before they can be protected. This can come from documentation or IT inventories. Proactive planning streamlines incident response to minimize negative impacts to the organization.
[READ LESS]
Produced by: SkillSoft
Applying security best practices to IT system creation and deployment can go a long way in reducing the attack surface. In this course, you will learn about the SDLC, penetration testing, how to mitigate...
[READ MORE]
Applying security best practices to IT system creation and deployment can go a long way in reducing the attack surface. In this course, you will learn about the SDLC, penetration testing, how to mitigate threats, and the security frameworks on which these countermeasure are based.
Applying security best practices to IT system creation and deployment can go a long way in reducing the attack surface. In this course, you will learn about the SDLC, penetration testing, how to mitigate threats, and the security frameworks on which these countermeasure are based.
[READ LESS]
Produced by: SkillSoft
Linux consists of many tools to manipulate files, streams, and processes from the command line that an administrator really needs to know in order to get the most from their system. This course will describe...
[READ MORE]
Linux consists of many tools to manipulate files, streams, and processes from the command line that an administrator really needs to know in order to get the most from their system. This course will describe and show the basic usage of some of the Linux tools that can be used to manipulate files, stream data, and manage processes. You will also learn how to prioritize processes and how to use basic Regular Expressions to do advanced searches and matches against files and file contents. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Linux+ exams LX0-103.
Linux consists of many tools to manipulate files, streams, and processes from the command line that an administrator really needs to know in order to get the most from their system. This course will describe and show the basic usage of some of the Linux tools that can be used to manipulate files, stream data, and manage processes. You will also learn how to prioritize processes and how to use basic Regular Expressions to do advanced searches and matches against files and file contents. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Linux+ exams LX0-103.
[READ LESS]
Produced by: SkillSoft
Disk and file management is critical to installing, securing, and maintaining any server, and a Linux administrator must understand the limits and capabilities of these resources to be effective in planning...
[READ MORE]
Disk and file management is critical to installing, securing, and maintaining any server, and a Linux administrator must understand the limits and capabilities of these resources to be effective in planning and building out Linux infrastructure. In this course, you will learn how to configure and manage partition tables, manage filesystems, configure disk quotas, use links, and manage file and directory permissions. You will also be introduced to the Filesystem Hierarchy Standard, or FHS. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Linux+ exams LX0-101 and LX0-102.
Disk and file management is critical to installing, securing, and maintaining any server, and a Linux administrator must understand the limits and capabilities of these resources to be effective in planning and building out Linux infrastructure. In this course, you will learn how to configure and manage partition tables, manage filesystems, configure disk quotas, use links, and manage file and directory permissions. You will also be introduced to the Filesystem Hierarchy Standard, or FHS. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Linux+ exams LX0-101 and LX0-102.
[READ LESS]
Produced by: SkillSoft
A Linux distribution is made up of a number of utilities and programs. One key utility is the command line shell. In this course, you will learn how to use a shell to perform file and directory manipulation...
[READ MORE]
A Linux distribution is made up of a number of utilities and programs. One key utility is the command line shell. In this course, you will learn how to use a shell to perform file and directory manipulation and edit file contents. In particular, you will learn about the Bourne-again Shell (bash) and the VI text editor. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Linux+ exams LX0-103.
A Linux distribution is made up of a number of utilities and programs. One key utility is the command line shell. In this course, you will learn how to use a shell to perform file and directory manipulation and edit file contents. In particular, you will learn about the Bourne-again Shell (bash) and the VI text editor. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Linux+ exams LX0-103.
[READ LESS]
Produced by: SkillSoft
Linux installation and configuration is a multi-step process allowing customization based on requirements at almost every stage. In this course, you will learn about some of that customization and some basic...
[READ MORE]
Linux installation and configuration is a multi-step process allowing customization based on requirements at almost every stage. In this course, you will learn about some of that customization and some basic patterns of how to do an initial install. You will learn about hard drive partitioning, boot managers, software repositories and the tools necessary to maintain, update, and install software on different Linux distributions. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Linux+ exams LX0-103.
Linux installation and configuration is a multi-step process allowing customization based on requirements at almost every stage. In this course, you will learn about some of that customization and some basic patterns of how to do an initial install. You will learn about hard drive partitioning, boot managers, software repositories and the tools necessary to maintain, update, and install software on different Linux distributions. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Linux+ exams LX0-103.
[READ LESS]
Produced by: SkillSoft
Linux finds a home in every device we would think of as a computer, from Smartphones to PCs and data center servers. In this course, you will learn about the system architecture of Linux including how it...
[READ MORE]
Linux finds a home in every device we would think of as a computer, from Smartphones to PCs and data center servers. In this course, you will learn about the system architecture of Linux including how it interacts with peripherals and the boot sequence, and how to change the system RunLevels and Boot Targets. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Linux+ exams LX0-103.
Linux finds a home in every device we would think of as a computer, from Smartphones to PCs and data center servers. In this course, you will learn about the system architecture of Linux including how it interacts with peripherals and the boot sequence, and how to change the system RunLevels and Boot Targets. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Linux+ exams LX0-103.
[READ LESS]
Produced by: SkillSoft
A Linux system administrator needs to know how to configure the time, e-mail, printing, and logging features of a Linux system. In this course, you will learn about four of the essential services almost all...
[READ MORE]
A Linux system administrator needs to know how to configure the time, e-mail, printing, and logging features of a Linux system. In this course, you will learn about four of the essential services almost all Linux servers and clients will have configured: NTP time synchronization for accurate time, Mail Transfer Agents for e-mail, CUPS for printing, and the system logger to manage log messages. This course also covers configuring GUI interfaces using X server. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Linux+ exams LX0-104.
A Linux system administrator needs to know how to configure the time, e-mail, printing, and logging features of a Linux system. In this course, you will learn about four of the essential services almost all Linux servers and clients will have configured: NTP time synchronization for accurate time, Mail Transfer Agents for e-mail, CUPS for printing, and the system logger to manage log messages. This course also covers configuring GUI interfaces using X server. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Linux+ exams LX0-104.
[READ LESS]
Produced by: SkillSoft