What would you do in the face of an actual information security problem? These training courses each include a module devoted to fictional scenarios, based on real-world challenges that cybersecurity professionals face. Each course is self-paced and contain interactive games, real-world examples, expert videos, quizzes, assessments, and focused instruction.
Each of the courses in this bundle helps refine and enhance the skills that cybersecurity and IT professionals need. The concepts and principles covered focus attention on the needs of the expanding computer information security industry.
This bundle is designed for adult learners who are interested in gaining an introduction to information technology security. Some understanding of basic IT concepts is helpful.
Individual courses included in this programs are as follows:- Access Control and Identity Management Scenarios
- Application, Data, and Host Security Scenarios
- Compliance and Operational Security Scenarios
- Cryptography Scenarios
- Network Security Scenarios
- Threats and Vulnerabilities Scenarios