Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Become an IT Security Specialist

via LinkedIn Learning Path

Overview

Learn the core concepts needed to secure your organization's network as an IT security specialist. In this learning path, you'll cover all the foundations of IT security: from practical skills for securing hardware and network data to the basics of cryptography and cybercrime investigation and response.
  • Learn the principles of IT security and cybersecurity.
  • Develop practical skills for securing networks.
  • Investigate cybercrimes and know the basics of computer forensics.

Syllabus

Courses under this program:
Course 1: IT Security Foundations: Core Concepts
-Prepare for MTA exam 98-367, Security Fundamentals. Learn the core concepts of operating system and network-level security to avoid threats and eliminate system vulnerabilities.

Course 2: Cybersecurity Foundations
-Set a rock-solid foundation for your network, users, and data by learning the basics of cybersecurity. Explore key frameworks, threats, and strategies for responding to incidents.

Course 3: IT Security Foundations: Operating System Security
-Whether you’re using Windows, macOS, or Linux, learn how to secure your operating system against attacks.

Course 4: IT Security Foundations: Network Security
-Learn how to secure an organization's network to keep your interconnected systems and data safe and prepare for Microsoft Technology Associate (MTA) exam 98-367.

Course 5: Learning SSL/TLS
-Learn the skills you need to plan, implement, and maintain a public key infrastructure (PKI) ecosystem that supports SSL/TLS security certificates.

Course 6: Cybersecurity with Cloud Computing
-Discover how to use cybersecurity to mitigate your cloud computing risk. Learn how to secure cloud services such as Amazon Web Services, Google Apps, and Azure.

Course 7: Learning Computer Forensics
-Learn how to acquire and analyze data from computers or storage devices with computer forensics.

Course 8: Learning Vulnerability Management
-Learn the basics of vulnerability management. Discover why vulnerabilities exist, as well as how to manage them from start to finish.

Course 9: Learning Threat Modeling for Security Professionals
-Threat modeling helps security professionals understand what can go wrong—and what to do about it. Learn to use the four-question and STRIDE frameworks for threat modeling.

Course 10: Artificial Intelligence for Cybersecurity
-Learn how to leverage artificial intelligence (AI) to solve complex problems in the field of information security. Along the way, explore the risks of using AI for security.

Course 11: Ethics in Information Security
-Learn about the ethics of working in cybersecurity and how to have challenging conversations about those ethics.

Course 12: Soft Skills for Information Security Professionals
-Information security isn’t all ones and zeros. Learn how to communicate security concepts and proposals in terms that will resonate with audiences of all technical abilities.

Courses

Taught by

Lisa Bock, Malcolm Shore, Dan Lachance, Jungwoo Ryoo, Lora Vaughn, Adam Shostack, Sam Sehgal and Jerod Brennen

Reviews

Start your review of Become an IT Security Specialist

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.