Companies Home Search Profile

Secure your IT Systems & Network: For Sys Admins + Engineers

Focused View

Emilio Aguero

6:16:33

65 View
  • 1. Becoming a Security Expert.mp4
    03:51
  • 2. Security Devices for Sys Admins.mp4
    07:45
  • 3.1 Networking Protocols and Standards.docx
  • 3. Networking Protocols and Standards.mp4
    04:59
  • 1.1 Cybersecurity Threats and Attacks.docx
  • 1. Cybersecurity Threats and Attacks.mp4
    13:24
  • 2.1 Malware.docx
  • 2. Malware.mp4
    07:05
  • 3.1 Social engineering.docx
  • 3. Social Engineering.mp4
    09:47
  • 4.1 Phishing.docx
  • 4. Phishing Attacks.mp4
    05:27
  • 5.1 DDoS.docx
  • 5. DDoS.mp4
    05:23
  • 1. How to Protect Your Systems and Data.mp4
    05:19
  • 2.1 Passwords.docx
  • 2. Passwords Structure and Recommendations.mp4
    14:25
  • 3.1 MFA.docx
  • 3. Multi-Factor Authentication.mp4
    06:59
  • 4. Dont Use These Passwords.mp4
    04:45
  • 5.1 Data Encryption.docx
  • 5. Data Encryption.mp4
    06:37
  • 1. Server Security Top Tips.mp4
    11:17
  • 2. Physical Server Security.mp4
    07:44
  • 1.1 Introduction to Network Security.docx
  • 1.2 Network Security Devices.docx
  • 1. Network Security 101.mp4
    10:23
  • 2.1 Firewalls.docx
  • 2. Firewalls.mp4
    04:39
  • 3.1 Securing Networks - White and Blacklisting.docx
  • 3. Network Whitelists and Blacklists.mp4
    05:21
  • 4.1 VPN Overview.docx
  • 4. Virtual Private Networks (VPN).mp4
    07:35
  • 5.1 Best ways to stay safe online.docx
  • 5.2 The Cloud - Pros and Cons.docx
  • 5.3 The Cloud - Security Top Tips.docx
  • 5.4 Web Security and Secure Web Browsing.docx
  • 5. Cloud Security.mp4
    14:03
  • 6. WiFi Security.mp4
    10:32
  • 7.1 Using Wireshark.pdf
  • 7. Using Wireshark.mp4
    01:46
  • 1.1 How to Protect Your Systems and Data.docx
  • 1. Securing Desktops and Laptops.mp4
    09:51
  • 2.1 Software Updates.docx
  • 2. Software Updates, Calendars and Schedules.mp4
    07:48
  • 3. macOS Security.mp4
    11:54
  • 4. Encrypting your Hard Drives (Windows 11 and macOS).mp4
    06:45
  • 5. iPhone Security.mp4
    12:18
  • 6. iPad Security.mp4
    14:11
  • 7. Staying Safe Online.mp4
    08:06
  • 1. Apps & Security Importance of App Mgmt.mp4
    05:25
  • 2.1 Securing Applications .docx
  • 2. Apps & Security Ensuring Security.mp4
    07:20
  • 3.1 Securing Apps - White and Blacklisting.docx
  • 3. Apps & Security Approved App List.mp4
    12:21
  • 1. Security Monitoring.mp4
    09:39
  • 2. Log Analysis & Management.mp4
    06:25
  • 3.1 Incident Response.docx
  • 3. Incident Response.mp4
    05:15
  • 1.1 Data Retention Policy.pdf
  • 1. Backups at Work.mp4
    09:22
  • 2.1 Backup Types.pdf
  • 2. Backup Types (Incremental, Differential, Full).mp4
    03:19
  • 3. The 3-2-1 Rule.mp4
    11:00
  • 4. Immutable Backups.mp4
    03:42
  • 5. Retention Periods.mp4
    07:33
  • 1.1 Cybersecurity Audit.docx
  • 1. Security Audits.mp4
    06:34
  • 2.1 Penetration testing 101.docx
  • 2. Role of a PenTester (Ethical Hackers).mp4
    12:41
  • 3.1 Penetration Tester Engagement.docx
  • 3. Penetration Tester Engagement.mp4
    09:10
  • 1.1 Cybersecurity Certs.docx
  • 1. Cybersecurity Certifications.mp4
    10:35
  • 2.1 Cybersecurity awareness and training 101.docx
  • 2.2 Cybersecurity training Rollout Plan.docx
  • 2. Cybersecurity Awareness and Training.mp4
    11:51
  • 3.1 Acceptable Use Policy.pdf
  • 3.2 Information Security Policy.pdf
  • 3.3 SOC 101.pdf
  • 3. Whats next.mp4
    04:22
  • Description


    Learn all about Cybersecurity...and how to improve security across your systems and network

    What You'll Learn?


    • All about Cybersecurity - Common terminologies, concepts, and the threat landscape
    • Identity and Access Management
    • How to secure your company's servers and network, including firewalls, IDS, and VPNs
    • Operating system security and best practices for hardening
    • How to identify vulnerabilities, vulnerability scanning, patch management
    • Mobile device security
    • Learn about the importance of Backups

    Who is this for?


  • System Administrators and Engineers
  • Network Engineers
  • Helpdesk and Support Analysts
  • IT Management
  • Cybersecurity Administrators
  • What You Need to Know?


  • Mid to Moderate IT Skills
  • Passion to learn more about how to protect IT systems and networks
  • More details


    Description

    As technology continues to advance, so do the cyber threats that target our systems and networks. System administrators play a critical role in securing their organizations' digital assets, and it's essential for them to have a solid understanding of cybersecurity principles and best practices.

    This course is designed specifically for system administrators who want to enhance their cybersecurity knowledge and skills. In this course, you will learn the essential principles and techniques to secure your organization's systems and networks against cyber threats.

    We will cover a broad range of topics, including network security, operating system security, authentication and access control, vulnerability management, incident response, encryption and cryptography, web application security, mobile device security, and compliance and regulations. You will learn about the latest threats and attacks, including how to detect, prevent, and respond to them effectively.


    What we'll cover:


    1. Introduction to Cybersecurity: You will learn the basics of cybersecurity, including common terminology, concepts, and the threat landscape.

    2. Network Security: You will learn how to secure your organization's network, including firewalls, intrusion detection and prevention systems, and virtual private networks (VPNs).

    3. Operating System Security: You will learn how to secure operating systems, including Windows and Linux, and best practices for hardening them against cyber threats.

    4. Authentication and Access Control: You will learn about the importance of strong authentication and access control, including password policies, multi-factor authentication, and role-based access control.

    5. Vulnerability Management: You will learn how to identify and remediate vulnerabilities in your systems, including vulnerability scanning, patch management, and vulnerability assessment.

    6. Incident Response: You will learn about incident response, including how to detect, respond to, and recover from cybersecurity incidents.

    7. Best practices around backups and data recovery: How to structure and setup a robust backup system with cybersecurity in mind.

    8. Web Application Security: You will learn how to secure web applications, including common vulnerabilities and best practices.

    9. Mobile Device Security: You will learn about mobile device security, including how to secure mobile applications and mobile device management.

    10. and much more...

    By the end of this course, you will have a solid understanding of cybersecurity essentials and be able to apply them to secure your organization's systems and networks. You will also be well-prepared to pursue further training in the cybersecurity field.

    Who this course is for:

    • System Administrators and Engineers
    • Network Engineers
    • Helpdesk and Support Analysts
    • IT Management
    • Cybersecurity Administrators

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Emilio Aguero
    Emilio Aguero
    Instructor's Courses
    Emilio is an accomplished professional and leader with over 20 years of with experience in IT professional services, digital transformation, infrastructure and operations management. Emilio loves helping people learn and achieve their goals, providing them the skills and expertise to make their professional careers better and more rewarding.Areas of Expertise include -- Win Server, macOS + integration- Storage Architecture- Virtualisation, VMware- Cybersecurity Hardening- IT Governance- DR and Backup Design
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 46
    • duration 6:16:33
    • Release Date 2023/09/12