Beginning Skills for Information Security Roles

This training is ideal for (but not limited to) individuals who are in or are interested in positions involving Information Security at a department or unit level.

Prerequisites: Your manager’s approval, General IT technical knowledge

 

Business Basics (Required)

Choose one of the following Soft Skills for Technicians courses:

 

Course 1: IT Security Foundations: Core Concepts

LinkedIn Learning – 1h 13m

Computing and Internet security are everyone's business, but it's especially critical for information technology specialists. Learning the core concepts of operating-system and network-level security helps avoid ongoing threats and eliminate system vulnerabilities. This beginner-level course covers core security concepts and introduces risks such as social engineering, malware, and spyware. Foundations of IT Security series creator Lisa Bock will also go over some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption.

Go to Course

 

Course 2: Learning Security Frameworks

LinkedIn Learning – 47m

Security frameworks are designed to help organizations boost their security posture. Such frameworks provide security practitioners—and their business partners—with a common set of practices to follow, as well as a baseline that makes it easier to report on improvements. In this course, join Mandy Huth as she covers the top four frameworks available, goes over how the frameworks compare, and shares how you can actually map your security controls across multiple frameworks. Mandy also shows how to determine your core security set, stepping through how to define what you'll do and how you'll measure it, and then prove that you did what you sought out to do. Throughout the course, she shares best practices that can help you start leveraging a security framework in your own company.

Go to Course

 

Course 3: Learning the OWASP Top 10

LinkedIn Learning – 43m

It seems like there is a security-related incident in the news every day. What makes systems—and the software that runs them—vulnerable to attack? The Open Web Application Security Project (OWASP) was formed to provide the public with the resources to understand and improve software security. The OWASP Top 10 list describes the ten biggest vulnerabilities. In this course, application security expert Caroline Wong provides an overview of the 2017 OWASP Top 10, presenting information about each vulnerability category, its prevalence, and its impact. Though aimed at IT security professionals and developers, anyone who uses web applications will benefit from an understanding of these risks.

Go to Course

 

Course 4: Learning Cloud Computing: Cloud Security

LinkedIn Learning – 1h 32m

Understand the basics of cloud security—a core component of cloud computing. Beginning with the basics, instructor David Linthicum explains the business case for cloud security and the levels and models available, including infrastructure-, application-, and data-level security; identity and risk management; encryption; and multifactor authentication. He then dives into the services offered by the top three cloud providers: Amazon, Microsoft, and Google. He reviews the compliance issues that affect specific industries, including health care and finance, and reviews the points you need to consider when identifying your security requirements and the security tools, services, and software to best meet those needs.

Go to Course

 

Course 5: IT Security Careers and Certifications: First Steps

LinkedIn Learning – 2h 8m

Demand for information security professionals has never been higher—and it's only projected to grow. Interested in finding a job in this exciting new field? Or simply advancing to the next level? IT security expert Marc Menninger explains how to launch and develop a successful career in information security. Learn about the nine most common security jobs and the duties and qualifications for each role. Learn which security certifications are most frequently requested in job listings and which ones will help you get the job you want. Follow example career paths to learn how others have progressed: from IT hobbyist to help-desk technician to analyst, systems architect, and more. Marc closes with a few pieces of career advice specific to the world of information security, which will help you succeed in this dynamic and high-demand industry.

Go to Course

 


Conferences (Optional)

 

Professional Organizations