Cybersecurity for IT Professionals

Go to class
Write Review

Free Online Course: Cybersecurity for IT Professionals provided by LinkedIn Learning is a comprehensive online course, which lasts for 2-3 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Cybersecurity for IT Professionals is taught by Malcolm Shore.

Overview
  • Protect your networks from cyberattacks. Learn how to implement antivirus protection and firewalls and scan for suspicious activity.

Syllabus
  • Introduction

    • Learn the basics and common tools of cybersecurity
    • What you should know
    • Disclaimer
    1. Why Cybersecurity?
    • A history of hackers
    • The cyber kill chain
    • Stuxnet and the kill chain
    • Common forms of cyber attack
    2. Antivirus
    • Viruses, spyware, and adware
    • Introducing Microsoft Windows Defender
    • Detecting malware with Defender
    • Defender advanced settings
    • Automating scans with task scheduler
    • Other antivirus solutions
    3. Firewalls
    • Why firewalls?
    • Windows firewall basics
    • Advanced Windows firewall
    • ZedLan firewall log analyzer
    • Introducing Linux iptables
    • Setting up a simple iptables firewall
    4. Network Scanning
    • Getting started with Nmap
    • Advanced Nmap options
    • GUI scanning with Zenmap
    5. Network Connections
    • Getting started with netcat
    • Transferring files using netcat
    • Connecting to services
    • Setting up a netcat honeypot
    6. Vulnerability Scanning
    • Preparing Nessus to do scanning
    • Setting up a Nessus policy
    • Running a Nessus scan
    • Scheduling scans
    7. Web Applications
    • Combating application level threats
    • Running an SQL injection attack
    • Cross-site scripting
    • Installing a web scanner
    • Scanning a website
    • Using a web proxy to inspect traffic
    8. Monitoring Packets
    • Explaining networks
    • Capturing packets with Wireshark
    • Making sense of the protocols
    • Using Wireshark filters
    • Capturing intruders with packets
    Conclusion
    • Next steps