Learn the core concepts needed to secure your organization's network as an IT security specialist. In this learning path, you'll cover all the foundations of IT security: from practical skills for securing hardware and network data to the basics of cryptography and cybercrime investigation and response.
-
Learn the principles of IT security and cybersecurity.
-
Develop practical skills for securing networks.
-
Investigate cybercrimes and know the basics of computer forensics.
Courses
-
1
IT Security Foundations: Core Concepts1h 52mIT Security Foundations: Core Concepts
By: Lisa Bock
Learn the core concepts of operating system and network-level security to avoid threats and eliminate system vulnerabilities.
-
2
Cybersecurity Foundations3h 33mCybersecurity Foundations
By: Malcolm Shore
Set a rock-solid foundation for your network, users, and data by learning the basics of cybersecurity. Explore key frameworks, threats, and strategies for responding to incidents.
-
3
IT Security Foundations: Operating System Security2h 4mIT Security Foundations: Operating System Security
By: Lisa Bock
Whether you’re using Windows, macOS, or Linux, learn how to secure your operating system against attacks.
-
4
IT Security Foundations: Network Security2h 43mIT Security Foundations: Network Security
By: Lisa Bock
Learn how to secure an organization's network and keep your interconnected systems and data safe.
-
5
TLS for Beginners: Securing Network Communications3h 3mTLS for Beginners: Securing Network Communications
By: Daniel Lachance
Build your proficiency in planning and managing PKI certificates for use in TLS communications.
-
6
Cybersecurity with Cloud Computing2h 35mCybersecurity with Cloud Computing
By: Malcolm Shore
Discover how to use cybersecurity to mitigate your cloud computing risk. Learn how to secure cloud services such as Amazon Web Services, Google Apps, and Azure.
-
7
Cybersecurity Foundations: Computer Forensics2h 42mCybersecurity Foundations: Computer Forensics
By: Jungwoo Ryoo
Learn how to acquire and analyze data from computers or storage devices with computer forensics.
-
8
Vulnerability Management in Cybersecurity: The Basics55mVulnerability Management in Cybersecurity: The Basics
By: Lora Vaughn
Learn the basics of vulnerability management. Discover why vulnerabilities exist as well as how to manage them from start to finish.
-
9
Learning Threat Modeling for Security Professionals46mLearning Threat Modeling for Security Professionals
By: Adam Shostack
Threat modeling helps security professionals understand what can go wrong—and what to do about it. Learn to use the four-question and STRIDE frameworks for threat modeling.
-
10
Artificial Intelligence for Cybersecurity1h 43mArtificial Intelligence for Cybersecurity
By: Sam Sehgal
Learn how you can use AI—with appropriate preparation and guardrails—to address complex problems in cybersecurity.
-
11
Ethics in Cybersecurity56mEthics in Cybersecurity
By: Jerod Brennen
Learn about the ethics of working in cybersecurity and how to have challenging conversations about those ethics.
-
12
Soft Skills for Information Security Professionals1h 18mSoft Skills for Information Security Professionals
By: Jerod Brennen
Information security isn’t all ones and zeros. Learn how to communicate security concepts and proposals in terms that will resonate with audiences of all technical abilities.
Instructors
Lisa Bock
Cybersecurity Author @ LinkedIn | Certified Ethical Hacker, Penetration Testing
Malcolm Shore
Cybersecurity Consultant
Daniel Lachance
Consultant, Trainer, Author, Editor at Lachance IT Consulting Inc.
Jungwoo Ryoo
Chancellor & CAO, Penn State DuBois | Making Connections and Bringing Clarity!
Lora Vaughn
Cybersecurity Executive | LinkedIn Learning Author | Speaker
Adam Shostack
Leading expert in threat modeling + secure by design. Training • Consulting • Expert Witness. "Threat Modeling" + "Threats: What every Engineer Should Learn from Star Wars." Affiliate Professor, University of Washington.
Sam Sehgal
Jerod Brennen
Cybersecurity Career Coach 🧭 | vCISO & Executive Advisor 🛡️ | Empowering Organizations and Individuals to Flourish by Simplifying Cybersecurity 🤝