Cybersecurity Administration
Rated 3.5/5 based on 11 customer reviews

Cybersecurity Administration

Available: Out of Stock
$0.00

Request Info
The Cybersecurity Administration skill path covers a variety of high-level tasks related to cybersecurity, including implementing identity and access management, understanding asset security, integrating enterprise security, performing assessments and more.

Risk Metric Scenarios

Course | 12 minutes

This course on risk metric scenarios covers analyzing scenarios to secure enterprises and reviewing existing security.

Vulnerability Assessment Methods and Tools

Course | 21 minutes

This course helps you broaden your understanding of vulnerability assessment and tools, including tool lists and test types

Software Vulnerabilities and Security Controls

Course | 37 minutes

In this course, we take you through the fundamentals of software vulnerabilities and security controls

Integrating Cloud and Virtualization Technologies

Course | 33 minutes

In this course, you’ll get to grips with the challenges of integrating cloud and virtualization technologies. Includes vocabulary and guidelines.

Integrating Hosts, Storage, Networks and Applications

Course | 28 minutes

Put the pieces together with this course on integrating hosts, storage, networks and applications. Includes vocabulary and guidelines.

Incident Response and Recovery Procedures

Course | 16 minutes

Prepare for possible trouble with this course on incident response and recovery procedures, including designing systems to facilitate incident response.

Integrating Authentication and Authorization Technologies

Course | 22 minutes

Review and update your knowledge of integrating authentication and authorization technologies with this course covering advanced identity management and more.

Implementing Cryptographic Techniques

Course | 30 minutes

Brush up on your understanding of implementing cryptographic techniques with this course covering cryptographic design, techniques and implementations.

Securing Communications and Collaboration Solutions

Course | 14 minutes

Secure your communications and collaboration solutions with this course covering BYOD, mobile device management and more.

Asset Security

Course | 39 minutes

Learn how to secure sensitive data, including managing and classifying data, working with data at rest and in transit, and implementing data security controls.

Risk Mitigation Strategies and Controls

Course | 26 minutes

Dive into risk mitigation strategies and controls with this course on risk scenarios, responses and more.

Business and Industry Influences and Risks

Course | 15 minutes

Brush up on your knowledge of business and industry influences and risks with this course on enterprise risk management (ERM) and business models.

Security Assessment

Course | 20 minutes

Discover any weak spots in your cyber defense. Learn how to use security assessments to identify, analyze and report on an organization’s cyber risk.

Access Control Fundamentals

Course | 1 hour 37 minutes

Take a deep dive into one of the fundamental concepts of security: access control. Learn how to give the right people access to the right information in a secure way.

Secure Network Design

Course | 26 minutes

Explore key concepts behind secure network design, including tools to keep threats out and techniques to detect and deflect intruders that breach your defenses.

WAN & Remote Access Security

Course | 33 minutes

Learn about securing wide area networks (WAN) and remote access against different types of cyber threats in this five-video course.

Network Fundamentals

Course | 1 hour 20 minutes

Go in-depth into networking devices and technologies. Explore network types, protocols, models, attacks, security and more.

The Cybersecurity Administration skill path covers a variety of high-level tasks related to cybersecurity, including implementing identity and access management, understanding asset security, integrating enterprise security, performing assessments and more.

Risk Metric Scenarios

Course | 12 minutes

This course on risk metric scenarios covers analyzing scenarios to secure enterprises and reviewing existing security.

Vulnerability Assessment Methods and Tools

Course | 21 minutes

This course helps you broaden your understanding of vulnerability assessment and tools, including tool lists and test types

Software Vulnerabilities and Security Controls

Course | 37 minutes

In this course, we take you through the fundamentals of software vulnerabilities and security controls

Integrating Cloud and Virtualization Technologies

Course | 33 minutes

In this course, you’ll get to grips with the challenges of integrating cloud and virtualization technologies. Includes vocabulary and guidelines.

Integrating Hosts, Storage, Networks and Applications

Course | 28 minutes

Put the pieces together with this course on integrating hosts, storage, networks and applications. Includes vocabulary and guidelines.

Incident Response and Recovery Procedures

Course | 16 minutes

Prepare for possible trouble with this course on incident response and recovery procedures, including designing systems to facilitate incident response.

Integrating Authentication and Authorization Technologies

Course | 22 minutes

Review and update your knowledge of integrating authentication and authorization technologies with this course covering advanced identity management and more.

Implementing Cryptographic Techniques

Course | 30 minutes

Brush up on your understanding of implementing cryptographic techniques with this course covering cryptographic design, techniques and implementations.

Securing Communications and Collaboration Solutions

Course | 14 minutes

Secure your communications and collaboration solutions with this course covering BYOD, mobile device management and more.

Asset Security

Course | 39 minutes

Learn how to secure sensitive data, including managing and classifying data, working with data at rest and in transit, and implementing data security controls.

Risk Mitigation Strategies and Controls

Course | 26 minutes

Dive into risk mitigation strategies and controls with this course on risk scenarios, responses and more.

Business and Industry Influences and Risks

Course | 15 minutes

Brush up on your knowledge of business and industry influences and risks with this course on enterprise risk management (ERM) and business models.

Security Assessment

Course | 20 minutes

Discover any weak spots in your cyber defense. Learn how to use security assessments to identify, analyze and report on an organization’s cyber risk.

Access Control Fundamentals

Course | 1 hour 37 minutes

Take a deep dive into one of the fundamental concepts of security: access control. Learn how to give the right people access to the right information in a secure way.

Secure Network Design

Course | 26 minutes

Explore key concepts behind secure network design, including tools to keep threats out and techniques to detect and deflect intruders that breach your defenses.

WAN & Remote Access Security

Course | 33 minutes

Learn about securing wide area networks (WAN) and remote access against different types of cyber threats in this five-video course.

Network Fundamentals

Course | 1 hour 20 minutes

Go in-depth into networking devices and technologies. Explore network types, protocols, models, attacks, security and more.