Entry Level Information Security Specialist Career Path - ITU Online

Entry Level Information Security Specialist Career Path


Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists. Gain foundational skills, industry certifications, and the knowledge needed to secure and protect digital assets in today’s dynamic cyber landscape.

Original price was: $129.00.Current price is: $51.60.

This Entry Level Information Security Specialist Career Path Features

109 Hrs 39 Min
502 On-demand Videos
Closed Captions

Closed Captions

Course Topics
61  Topics
Question & Answers
898 Prep Questions
Certificate of Completion

Certificate of Completion

The Job Role of an Entry-Level Information Security Specialist

An entry-level Information Security Specialist is typically tasked with a variety of responsibilities that lay the groundwork for a career in cybersecurity. Here are some of the responsibilities they may be expected to handle:

  1. Monitoring Security Systems: Regularly monitor the organization’s security solutions for unusual activities and potential threats, ensuring systems are functioning correctly.
  2. Vulnerability Assessments: Assist in performing vulnerability scans and basic penetration tests on the organization’s systems to identify vulnerabilities that could be exploited by malicious actors.
  3. Security Incident Response: Support the response to security breaches or incidents, including initial analysis and participation in the remediation process.
  4. Updating Security Measures: Help to update the organization’s antivirus software, firewalls, and other security tools to protect systems and data.
  5. Security Awareness: Participate in the development and dissemination of information security policies and procedures to employees, and potentially assist in conducting security awareness training sessions.
  6. Compliance: Assist in ensuring that the organization complies with relevant information security standards and regulations, such as GDPR or HIPAA, and internal policies.
  7. Reporting: Generate regular reports documenting security incidents and breaches, the effectiveness of the security measures, and any changes in the threat landscape.
  8. Technical Support: Provide basic technical support related to security provisioning, such as setting up user accounts and managing access controls.
  9. Research and Development: Keep up-to-date with the latest security systems, software, trends, and threats to suggest improvements to existing security solutions.
  10. Collaboration: Work as part of the IT team to ensure that security measures are integrated into all technology-related activities within the organization.

An entry-level Information Security Specialist is expected to develop a broad set of foundational skills that will serve as building blocks for more advanced roles in cybersecurity.

Your Learning Path

Course: 1 - Estimated 3 Week(s) To Complete
CompTIA A+ 220-1101 (Core 1) Course Content
21 Hours 52 Minutes 139 Videos 125 Prep Questions
This course provides entry-level information security specialists with essential knowledge of computing hardware and peripherals, which is critical for understanding and safeguarding the physical components of information systems against security threats.

Module 1 - Devices, Setups, and Installs
   1.1 Introduction to the Course, Meet the Instructor
   1.2 Appropriate Safety Procedures
   1.3 PC Components
   1.4 Guidlines for PC Disassembly
   1.5 Motherboards
   1.6 CPU Sockets
   1.7 PCI Bus
   1.8 Storage Bus (SATA and IDE)
   1.9 Discussing PC Components
   1.10 Common Connection Interfaces
   1.11 Wired and Wireless Connection Standards
   1.12 Install Peripheral Devices
   1.13 Guidlines and Discussion for Installing Peripheral Devices

Module 2 - Displays and Multimedia Devices
   2.1 Displays and Multimedia
   2.2 Display Device Connections and Cables
   2.3 Discussing Display Device Installation and Configuration
   2.4 Troubleshoot Display Devices
   2.5 Guidelines for Troubleshooting Display Devices
   2.6 Discussing Display Device Troubleshooting
   2.7 Install and Configure Multimedia Devices
   2.8 Discussing Multimedia Device Installation and Configuration

Module 3 - Supporting Multiple Drive Types
   3.1 Supporting Multiple Drive Types and Memory
   3.2 Memory Types
   3.3 RAM Types
   3.4 Memory Modules
   3.5 DIMM and SO-DIMM Technologies
   3.6 Parity and ECC RAM
   3.7 Memory Compatibility Issues
   3.8 Discussing System Memory Installation
   3.9 Install and Configure Mass Storage Devices
   3.10 Storage Adapters and Cables
   3.11 Solid State Drives
   3.12 Guidlines for Installing Mass Storage Devices
   3.13 Discussing Mass Storage Device Installation and Configuration
   3.14 Install and Configure Removable Storage
   3.15 Discussing Removable Storage Device Istallation and Configuration
   3.16 Configure RAID
   3.17 RAID Configuration Options
   3.18 Discussing RAID Configuration
   3.19 Troubleshoot Storage Devices
   3.20 Boot Failures
   3.21 Discussing Storage Device Troubleshooting

Module 4 - Accounting for CPUs and Internal Components
   4.1 Install Upgrade CPUs
   4.2 Multiprocessing and Multicore Processors
   4.3 Discussing CPU Upgrades
   4.4 Configure and Update BIOS UEFI
   4.5 Discussing BOIS-UEFI Configuration and Updates
   4.6 Install Power Supplies
   4.7 Discussing Power Supply Installation
   4.8 Troubleshoot Internal System Components
   4.9 POST and Boot Problems
   4.10 Boot Troubleshooting and Log Entries
   4.11 Motherboard Component Problems
   4.12 Discussing System Component Troubleshooting

Module 5 - All About Network Theories
   5.1 Wired Networks
   5.2 Common Ethernet Network Implementations
   5.3 Taps and Mirrors
   5.4 Discussing Wired Networks
   5.5 Network Hardware Devices
   5.6 Switches
   5.7 Power Over Ethernet
   5.8 Discussing Network Hardware Devices
   5.9 Wireless Networks
   5.10 Access Points and Wireless Network Modes
   5.11 Discussing Wireless Networks
   5.12 Internet Connection Types
   5.13 Wireless Internet Service Providers WISP
   5.14 Discussing Internet Connection Types
   5.15 Network Configuration Concepts
   5.16 The TCIP-IP Protocol Suite
   5.17 Internet Protocol and IP Addressing
   5.18 Public and Private IP Addresses
   5.19 IPv6
   5.20 Discussing Network Configuration Concepts
   5.21 Network Services
   5.22 DNS
   5.23 Dynamic and Static IP Configurations
   5.24 DNS Records MX and A
   5.25 Web Servers and HTTP-HTTPS
   5.26 Discussing Network Services

Module 6 - Network Operations and Diagnostics
   6.1 Configuring and Troubleshooting Networks
   6.2 Network Connections in Windows
   6.3 Install and Configure SOHO Networks
   6.4 Configure SOHO Network Security
   6.5 Firewalls
   6.6 Port Fowarding and Port Triggering
   6.7 Windows Firewall
   6.8 Network Security and Embedded Appliances
   6.9 Configure Remote Access
   6.10 Discussing Remote Access Configuration
   6.11 Troubleshoot Network Connections
   6.12 IP Configuration Issues
   6.13 Routing Issues
   6.14 Discussing Network Connection Troubleshooting

Module 7 - Cloud and Virtualization Computing
   7.1 Configure Client-Side Virtulaization
   7.2 Hypervisors
   7.3 Processor Support and Resource Requirements
   7.4 Virtual Networks
   7.5 Client-Side Virtualization
   7.6 Cloud Computing Concepts
   7.7 Internal and External Shared Resources
   7.8 Cloud Service Options
   7.9 Virtual Desktops
   7.10 Software-Defined Networking (SDN)
   7.11 Discussing Cloud Computing Concepts

Module 8 - Laptop Features and Troubleshooting
   8.1 Use Laptop Features
   8.2 Expansion Options
   8.3 Discussing Laptop Features
   8.4 Install and Configure Laptop Hardware
   8.5 Discussing Laptop Hardware Installation and Configuration
   8.6 Troubleshoot Common Laptop Issues
   8.7 Discussing Troubleshooting Common laptop Issues

Module 9 - Syncing and Setup of Mobile Devices
   9.1 Syncing and Setup of Mobile Devices
   9.2 Connect and Configure Mobile Devices
   9.3 Configure Mobile Device Network Connectivity
   9.4 Mobile VPN Configuration
   9.5 Email Configuration Options
   9.6 Discussing Mobile Device Network Connectivity Configuration
   9.7 Support Mobile Apps
   9.8 Discussing Mobile App Support

Module 10 - All Things Printing
   10.1 All Things Printing
   10.2 Discussing Laser Printer Maintenance
   10.3 Maintain Inkjet Printers
   10.4 Discussing Inkjet Printer Maintenance
   10.5 Maintain Impact, Thermal, and 3D Printers
   10.6 Discussing Impact, Thermal, and 3D Printer Maintenance
   10.7 Install and Configure Printers
   10.8 Discussing Printer Installation and Configuration
   10.9 Troubleshoot Print Device Issues
   10.10 Install and Configure Imaging Devices
   10.11 Discussing Device Installation and Configuration

Module 11 - Resources and Testing
   11.1 Introduction to Resources and Testing
   11.2 Resources and Testing
   11.3 Joining a Domain with Windows 10
   11.4 Boot Order and BIOS
   11.5 Virtual Machine Install & Configure
   11.6 PC Teardown
   11.7 Exploring the Laptop
   11.8 Install Windows 10 Demonstration

Course: 2 - Estimated 3 Week(s) To Complete
CompTIA A+ 220-1102 (Core 2) Course Content
20 Hours 34 Minutes 135 Videos 125 Prep Questions
It builds upon the hardware knowledge by delving into operating systems, software troubleshooting, and operational procedures, equipping entry-level specialists with the capabilities to manage and protect systems software and ensure operational security.

Module 1 - Operating System Management
   1.1 Introduction to the Course, Meet the Instructor
   1.2 Identify Common Operating Systems
   1.3 Microsoft Windows
   1.4 Work and Education Features
   1.5 Windows System Limits
   1.6 Apple Operating Systems
   1.7 Linux Disk and File Management
   1.8 Discussing OS Types
   1.9 Use Windows Features and Tools
   1.10 Administrative Tools
   1.11 Manage Files in Windows
   1.12 System Hierarchies
   1.13 File Attributes
   1.14 Discussing Windows Features and Tools
   1.15 Manage Disks in Windows
   1.16 Discussing File Management in Windows
   1.17 The Windows Disk Management Console
   1.18 Discussing Windows Disk Management
   1.19 Manage Devices in Windows
   1.20 Device Manager
   1.21 Discussing Windows Device Manager

Module 2 - Configuring and installing the OS
   2.1 Configuring and Installing the OS
   2.2 Installation Boot Methods
   2.3 Disk Formatting and Partitioning
   2.4 Networking Considerations
   2.5 Post Installation Tasks
   2.6 OS Installation Types
   2.7 Unattended Installations
   2.8 Maintain OSs
   2.9 OS Updates
   2.10 Anti-Malware Updates
   2.11 Scheduled Backups
   2.12 Task Schedulers part 1
   2.13 Task Schedulers part 2
   2.14 Install Windows 10 Demonstration
   2.15 Discussing OS Maintenance

Module 3 - Tools to Troubleshoot and Maintain the OS
   3.1 Install and Manage Windows Applications
   3.2 Windows OS Tools
   3.3 Application and Print Services
   3.4 Task Manager
   3.5 Manage Windows Performance
   3.6 Windows Performance Management Tools
   3.7 Troubleshoot Windows
   3.8 Event Viewer
   3.9 The System Configuration Utility
   3.10 Troubleshooting Tips Boot Process
   3.11 Troubleshooting Tips for Windows System Issues
   3.12 Blue Screens and Spontaneous Shutdowns
   3.13 Troubleshooting Tips for File and Memory Corruption
   3.14 Safe Boot
   3.15 System Repair Disc
   3.16 System Restore
   3.17 Guidelines for Troubleshooting Windows Issues

Module 4 - Network Management Tools
   4.1 Network Management Tools
   4.2 Network Connectivity
   4.3 IP Addressing and Connection Types
   4.4 Proxy Settings
   4.5 Windows Client Configuration
   4.6 Location Services
   4.7 Firewalls
   4.8 Network Troubleshooting
   4.9 Remote Desktop Tools
   4.10 Desktop Management and Remote Monitoring Tools
   4.11 Disscussion Topics

Module 5 - Sharing Resources and Wrights Management
   5.1 Sharing Resources and Wrights Management
   5.2 User Group Accounts
   5.3 Local Secutity Policy
   5.4 SSO and Credential Manager
   5.5 Workgroups and Homegroups
   5.6 Network and Sharing Center
   5.7 Network Share Configuration
   5.8 NTSF File and Folder Permissions
   5.9 Configure Active Directory Accounts and Policies
   5.10 Domain Membership and Group Policy Objects
   5.11 Basic AD Functions
   5.12 Account Locks and Password Resets

Module 6 - Threats and Security Measures
   6.1 Threats and Security Measures
   6.2 Logical Security Concepts
   6.3 Encryption
   6.4 PKI and Certificates
   6.5 Execution Control
   6.6 NAC
   6.7 Discussing Logical Decurity Concepts
   6.8 Threats and Vulnerablilities
   6.9 Types of Password Attacks
   6.10 Discussing Threats and Vulnerabilities
   6.11 Physical Security Controls
   6.12 Discussing Physical Security Measures

Module 7 - Policies to Protect Data
   7.1 Policies to Protect Data
   7.2 Implement Security Best Practices
   7.3 Guidlines for Implementing Security Best Practices
   7.4 Discussing Security Best Practices Implementation
   7.5 Implement Data Protection Policies
   7.6 ACLs and Directory Permissions
   7.7 Full Disk Encryption
   7.8 Guildlines for Implementing Data Protection Policies
   7.9 Discussing Data Protection Policies
   7.10 Protect Data During Incident Response
   7.11 Discussing Data Protection During Incident Response

Module 8 - Prevent Malware and Security Threats
   8.1 Prevent Malware and Security Threats
   8.2 Detect, Remove, and Prevent Malware
   8.3 Trojan Horses and Spyware
   8.4 Sources of Malware Infection
   8.5 Best Practices for Malware Removal
   8.6 Discussing Detecting, Removing, and Preventing Malware Infections
   8.7 Troubleshoot Common Workstation Security Issues
   8.8 Discussing Troubleshoot Common Workstation Security Issues

Module 9 - Supporting and Troubleshooting Mobile Devices
   9.1 Supporting and Troubleshooting Mobile Devices
   9.2 Secure Mobile Devices
   9.3 IOT Internet of Things
   9.4 Discussing Mobile Device Security
   9.5 Troubleshoot Mobile Device Issues
   9.6 Mobile Device Security Troubleshooting
   9.7 Discussing Troubleshooting Mobile Devices

Module 10 - Implementing Operational Procedures
   10.1 Implementing Operational Procedures
   10.2 Environmental Impacts and Controls
   10.3 Discussing Environmental Impact and Controls
   10.4 Create and Maintain Documentation
   10.5 Discussing Documentation Creation and Maintenance
   10.6 Use Basic Change Management Best Practices
   10.7 Discussing Change Management Best Practices
   10.8 Implement Disaster Prevention and Recovery Methods
   10.9 Discussing Implement Disaster Prevention and Recovery Methods
   10.10 Basic Scripting Concepts
   10.11 Discussing Scripting
   10.12 Professionalism and Communication
   10.13 Discussing Professionalism and Communication Skills

Module 11 - Resources and Testing
   11.1 Introduction to Resources and Testing
   11.2 Resources and Testing
   11.3 Joining a Domain with Windows 10
   11.4 Boot Order and BIOS
   11.5 Virtual Machine Install & Configure
   11.6 PC Teardown
   11.7 Exploring the Laptop
   11.8 Install Windows 10 Demonstration

Course: 3 - Estimated 1 Week(s) To Complete
Microsoft Security Fundamentals Course Content
04 Hours 44 Minutes 24 Videos 74 Prep Questions
This course lays the foundation in security concepts crucial for an entry-level information security specialist, covering topics such as network security, software security, and organizational security policies and procedures.

Module 1 Understanding Security Layers
   Module 1 Notes
   1.0 Security Fundamentals Instructor
   1.1 Security Fundamentals Intro
   1.2 Understanding Security Layers Part1
   1.3 Understanding Security Layers Part2

Module 2 Authentication, Authorization, and Accounting
   Module 2 Notes
   2.0 Authentication, Authorization & Accounting Part1
   2.1 Authentication, Authorization & Accounting Part2
   2.2 Authentication, Authorization & Accounting Demo

Module 3 Understanding Security Policies
   Module 3 Notes
   3.0 Understanding Security Policies

Module 4 Understanding Network Security
   Module 4 Notes
   4.0 Understanding Network Security Part1
   4.1 Understanding Network Security Part2

Module 5 Locking Down Server and Client
   Module 5 Notes
   5.0 Locking Down the Server and Client
   5.1 Locking Down the Server and Client Part2

Module 6 Key Takeaways
   Key Takeaway Notes
   6.0 Key Take Aways Intro
   6.1 Understanding Security Layers
   6.2 Authentication Authorization and Accounting
   6.3 Understanding Security Policies
   6.4 Understanding Network Security
   6.5 Security Fundamentals Part 2

Module 7 Terms to Know
   Terms to Know Notes
   7.0 Terms to Know Intro
   7.1 Understanding Security Layers Terms
   7.2 Authentication Authorization and Accounting Terms
   7.3 Understanding Security Policies Terms
   7.4 Understanding Network Security Terms
   7.5 Locking Down Server and Client Terms

Course: 2 - Estimated 7 Week(s) To Complete
CompTIA Network+ N10-008 Course Content
46 Hours 25 Minutes 189 Videos 179 Prep Questions
Focusing on networking concepts and operations, this course is crucial for managing and maintaining network infrastructure in Azure. It teaches skills in designing, implementing, and troubleshooting networks, which are key to efficiently handling Azure network services and connectivity.

Module 0 - Course introduction
   0.1 Instructor Intro
   0.2 Course Overview

Module 1 - Networking Fundamentals
   1.1 Intro to Networking
   1.1.1 Activity: Creating a Network
   1.2 Common Terminology
   1.2.1 Activity: Examining Ports and Sockets
   1.3 OSI Model
   1.4 DoD Model
   1.4.1 Activity: Examining Network Layers
   1.5 TCP, UDP, IP
   1.5.1 Activity: Examining TCP
   1.5.2 Activity: Examining UDP
   1.5.3 Activity: Examining IP
   1.6 ICMP, IGMP, ARP
   1.6.1 Activity: Examining ICMP
   1.6.2 Activity: Examining ARP
   1.6.3 Activity: Examining IGMP
   1.7 Network Topologies
   1.8 Network Types
   1.9 Part 1: Network Characteristics
   1.9 Part 2: Network Characteristics
   1.10 Module 1 outro

Module 2 - Cables and Connectors
   2.1 Ethernet Standards
   2.2 Copper Cable Types
   2.3 Fiber Optic Cable Types
   2.4 Connector Types
   2.4.1 Activity: Selecting the Right Cable
   2.5 Media Converters and Transceivers
   2.6 Cable Management
   2.7 Module 2 Outro

Module 3 - Internet Protocol (IP)
   3.1 IPv4 Basics
   3.2 IP Packet and Interface Types
   3.2.1 Activity: Configuring Client IP Settings
   3.3 Binary Numbering System
   3.4 Classful and Classless Addressing
   3.5 Understanding CIDR Notation
   3.6 IPv4 Subnetting Method
   3.7 Verifying with Binary
   3.8 Finding Subnet IDs
   3.8.1 Activity: Subnetting a Class C Network
   3.9 The Delta in Action
   3.9.1 Activity: Subnetting With the Delta
   3.10 Subnetting Based on Hosts
   3.11 Subnetting in Other Octets
   3.12 Supernetting
   3.12.1 Activity: Supernetting
   3.13 IPv6
   3.14 IPv4 - IPv6 Transition Mechanisms
   3.15 Module 3 Outro

Module 4 - Layer 7 Protocols
   4.1 Remote Control Protocols
   4.2 File Sharing Protocols
   4.3 Web Protcols
   4.4 Email Protocols
   4.5 Database Protocols
   4.6 Voice Protocols
   4.7 Security Protocols
   4.8 Management Protocols
   4.9 Module 4 Outro

Module 5 - Network Services
   5.1 DHCP
   5.1.1 Activity: Configuring DHCP
   5.1.2 Activity: Configuring a DHCP Relay Agent
   5.2 DNS
   5.2.1 Activity: Configuring DNS - Part 1
   5.2.2 Activity: Configuring DNS - Part 2
   5.3 NTP
   5.4 Corporate and Datacenter Network Architecture
   5.5 Cloud Concepts and Connectivity Options
   5.6 Module 5 Outro

Module 6 - Networking Devices
   6.1 Introductory Concepts
   6.2 Repeaters and Hubs
   6.2.1 Activity: Connecting Devices with a Hub
   6.3 Bridges and Switches
   6.3.1 Activity: Connecting Devices with a Switch
   6.4 Routers and Multilayer Switches
   6.5 Security Devices
   6.6 Modems
   6.7 Module 6 Outro

Module 7 - Networked Devices
   7.1 IP Devices
   7.2 IoT
   7.2.1 Activity - Programming IoT Devices
   7.3 ICS/SCADA
   7.4 Module 7 Outro

Module 8 - Routing and Bandwidth Management
   8.1 Routing Basics
   8.1.1 Activity: Configuring Static Routes
   8.2 Packet Delivery on the Same Network
   8.3 IP Routing Across a Single Router
   8.4 IP Routing Across Multiple Hops
   8.4.1 Activity: Static Routes - CHALLENGE
   8.5 Route Selection
   8.6 RIP
   8.6.1 Activity: Configuring RIP - CHALLENGE
   8.7 OSPF
   8.8 EIGRP
   8.9 BGP
   8.10 NAT/PAT
   8.11 Bandwidth Management (with Module 8 Outro)

Module 9 - Ethernet Switching
   9.1 Ethernet Basics
   9.2 Switching Overview
   9.2.1 Activity: Examining a MAC Table
   9.3 VLANs
   9.3.1 Activity: Creating VLANs
   9.4 VLAN Trunking
   9.4.1 Activity: Configuring VLAN Trunking
   9.5 VLAN Routing
   9.5.1 Activity: Configuring VLAN Routing
   9.6 Contention Management
   9.7 Switchport Configuration (with Module 9 Outro)

Module 10 - Wireless Technologies
   10.1 Wireless Overview
   10.2 Radio Basics
   10.3 Modulation
   10.4 Wi-Fi Standards
   10.5 Antennas
   10.6 Wi-Fi Service Sets
   10.7 Wi-Fi Security
   10.8 Cellular

Module 11 Network Performance
   11.1 Monitoring Performance
   11.2 Common Metrics
   11.2.1 Activity: Examining Interface Statistics
   11.3 SNMP
   11.4 Netflow
   11.5 Network Security Monitoring (with Module 11 Outro)

Module 12 High Availability and Disaster Recovery
   12.1 HA and DR Concepts
   12.2 High Availability Mechanisms
   12.3 Disaster Recovery Mechanisms
   12.4 Facility and Infrastructure Support (with Module 12 Outro)

Module 13 Organizational Documents
   13.1 Plans and Procedures
   13.2 Security Policies
   13.3 Loss Prevention
   13.4 Common Agreements
   13.5 Common Documentation
   13.6 Structured Cabling - MDF and IDF
   13.7 Horizontal and Vertical Cabling
   13.7.1 Activity - Implementing Cable Management
   13.8 Labeling
   13.9 Surveys and Assessments (with Module 13 Outro)

Module 14 Network Security
   14.1 Common Security Concepts
   14.2 Common Attack Types
   14.3 Spoofing-based Attacks
   14.4 Hijacking and MITM
   14.5 Social Engineering
   14.6 Network Segmentation
   14.7 Private VLANs
   14.8 Single Organization Authentication
   14.9 Extending Authentication
   14.10 Authorization
   14.11 Network Device Hardening
   14.12 Wireless Security
   14.13 Remote Access Security
   14.14 IoT Security
   14.15 Physical Security (with Module 14 Outro)

Module 15 Network Troubleshooting
   15.1 Troubleshooting Methodology
   15.2 Physical Connectivity Issues
   15.3 Hardware Testing Tools
   15.3.1 Activity - Testing an Ethernet Cable
   15.3.2 Activity - Crimping on an RJ-45 Connector
   15.3.3 Activity - Punching Down Twisted Pair
   15.3.4 Activity - Using a Telephone Toner
   15.4 Understanding Electricity
   15.4.1 Activity - Checking Cable Continuity
   15.4.2 Activity - Testing DC Voltage
   15.4.3 Activity - Testing AC Voltage
   15.5 Twisted Pair Pinout Problems
   15.6 Twisted Pair Termination Problems
   15.7 Repairing Damaged Twisted Pair Cable
   15.8 Fiber Optic Connectivity Issues
   15.8.1 Activity - Testing a Fiber Optic Cable
   15.9 Common Port Problems
   15.9.1 Working with Ports and Their Devices
   15.10 Common Software Testing Tools
   15.10.1 Activity - Scanning for Open Ports
   15.11 Common Command Line Utilities
   15.12 Troubleshooting Basic IP Networking Issues
   15.13 Common Switching Issues
   15.14 Switching Test Tools and Techniques
   15.15 Common IP Routing Issues
   15.16 Wi-Fi Access Point Issues
   15.17 Wirelss Interference
   15.17.1 Activity - Using a Spectrum Analyzer
   15.18 Wireless Antenna Issues
   15.18.1 Activity - Configuring a Wi-Fi Router
   15.19 WAP Placement Strategies
   15.20 Infrastructure Service Issues (DHCP)
   15.21 Infrastructure Service Issues (DNS)
   15.22 Infrastructure Service Issues (NTP)
   15.23 Fireall / ACL Issues
   15.24 VPN Issues
   15.25 Additional Network Security Troubleshooting and Tips
   15.26 Advanced Networking Issues
   15.27 Troubleshooting Server Services (with Module 15 Outro)
   CompTIA Network+ N10-008 Course Outro

Course: 3 - Estimated 3 Week(s) To Complete
CompTIA Security+ SY0-601 Course Content
16 Hours 01 Minutes 15 Videos 146 Prep Questions
As security is a paramount concern in cloud administration, this course provides the necessary grounding in cybersecurity practices. It covers risk management, incident response, and threat detection, equipping learners with the skills to secure Azure environments and protect data.

Module 1 - Introduction to Security
   1.1 Introduction to Security

Module 2 - Malware and Social Engineering Attacks
   2.1 Malware and Social Engineering Attacks

Module 3 - Basic Cryptography
   3.1 Basic Cryptography

Module 4 - Advanced Cryptography and PKI
   4.1 Advanced Cryptography and PKI

Module 5 - Networking and Server Attacks
   5.1 Networking and Server Attacks

Module 6 - Network Security Devices, Designs and Technology
   6.1 Network Security Devices, Designs and Technology

Module 7 - Administering a Secure Network
   7.1 Administering a Secure Network

Module 8 - Wireless Network Security
   8.1 Wireless Network Security

Module 9 - Client and Application Security
   9.1 Client and Application Security

Module 10 - Mobile and Embedded Device Security
   10.1 Mobile and Embedded Device Security

Module 11 - Authentication and Account Management
   11.1 Authentication and Account Management

Module 12 - Access Management
   12.1 Access Management

Module 13 - Vulnerability Assessment and Data Security
   13.1 Vulnerability Assessment and Data Security

Module 14 - Business Continuity
   14.1 Business Continuity

Module 15 - Risk Mitigation
   15.1 Risk Mitigation

Module 16 - Security Plus Summary and Review
   16.1 - Security Plus Summary and Review

Module 17 - Hands-On Training
   17.1 Hands-On Scanning Part 1
   17.2 Hands-On Scanning Part 2
   17.3 Hands-On Advanced Scanning
   17.4 Hands-On MetaSploit
   17.5 Hands-On BurpSuite
   17.6 Hands-On Exploitation Tools Part 1
   17.7 Hands-On Exploitation Tools Part 2
   17.8 Hands-On Invisibility Tools
   17.9 Hands-On Connect to Tor

Learning Path Description

Embark on a rewarding journey towards becoming an entry-level Information Security Specialist with our meticulously designed training series. This comprehensive program begins with the CompTIA A+ 220-1101 (Core 1) and CompTIA A+ 220-1102 (Core 2) courses, which lay the foundational stones of IT by imparting critical knowledge of computer hardware, software, and operational procedures. These courses are crucial for grasping the physical and software components of information systems, enabling you to troubleshoot issues, manage operating systems, and understand the core principles of IT operations security. As hardware and software form the bedrock of all IT infrastructure, proficiency in these areas is indispensable for any aspiring security professional.

With the basics in place, the training series elevates your expertise through the Microsoft 98-367 MTA Security Fundamentals course, where you will delve into essential security concepts that every Information Security Specialist must master. This includes understanding security layers, network security, and security software, as well as the pivotal security policies and procedures that protect and govern organizational data. These foundational security skills are vital for identifying potential threats and implementing the first line of defense against cyber vulnerabilities.

The learning path progresses with the CompTIA Network+ N10-008 course, which enriches your knowledge by exploring the realm of network configurations, management, and security. This course is tailored to provide the skills needed to design, configure, manage, and troubleshoot any network, ensuring its resilience against cyber threats. As networks are often the targets of cyber-attacks, your ability to secure them is key to your role as an Information Security Specialist.

Finally, the CompTIA Security+ SY0-601 course consolidates your cybersecurity expertise, focusing on the core security functions required to monitor, manage, and mitigate security risks to networks and applications. You’ll learn about the latest trends in risk management, incident response, forensics, enterprise networks, and hybrid/cloud operations. This globally recognized certification not only polishes your credentials but also significantly enhances your problem-solving skills, preparing you to tackle complex security challenges in today’s dynamic cyber environment.

Upon completing this series, you’ll be equipped with a holistic set of skills that are in high demand across the cybersecurity landscape. You’ll emerge not just as an individual with a strong IT background, but as a specialized Information Security Specialist poised to enter and excel in the cybersecurity workforce.

Who Is This Training For?

The training series is tailored to benefit a diverse group of individuals aiming to either enter or enhance their capabilities in the field of cybersecurity. Here’s a list of those who would gain significant value from this series:

  1. IT Graduates: Recent graduates with degrees in IT, computer science, or related fields who are looking to specialize in cybersecurity.
  2. Help Desk Technicians: Technical support staff seeking to transition into cybersecurity roles and expand their knowledge beyond troubleshooting and user support.
  3. Network Administrators: Professionals managing network systems who want to enhance their understanding of network security.
  4. Computer Systems Analysts: Analysts looking to deepen their security expertise and learn how to better protect the systems they design and analyze.
  5. Aspiring Security Professionals: Individuals aiming to start a career in cybersecurity and seeking foundational knowledge and certifications to boost their employability.
  6. Career Changers: Professionals from non-IT fields who possess a foundational understanding of computers and networks, looking to pivot into the high-demand field of cybersecurity.
  7. IT Security Hobbyists: Enthusiasts who have a passion for IT security and desire a structured learning path to formalize their knowledge and potentially move into professional roles.
  8. Junior Cybersecurity Staff: Entry-level cybersecurity employees aiming to solidify their knowledge base and earn certifications to advance in their careers.
  9. Systems Engineers: Engineers who require a deeper understanding of the security aspects of systems they design and maintain.
  10. Compliance and Risk Management Staff: Individuals responsible for ensuring their organizations meet regulatory compliance standards who need to understand the technical aspects of cybersecurity.
  11. Small Business Owners or IT Staff: Those responsible for their own or their organization’s cybersecurity but lack formal training in the field.
  12. Software Developers: Programmers and developers interested in understanding how to incorporate security best practices into the software development lifecycle.

By participating in this series, these individuals will be able to acquire the necessary skills and certifications to effectively address and manage cybersecurity challenges within various IT infrastructures.

Frequestly Asked Questions

What are the typical day-to-day responsibilities of an entry-level Information Security Specialist?

An entry-level Information Security Specialist typically monitors network and system activities for security breaches, assists in performing vulnerability assessments and penetration tests, helps develop and enforce security policies and procedures, provides support in incident response activities, and stays updated with current security trends and technologies.

What kind of technical skills are essential for an entry-level Information Security Specialist?

Essential technical skills include a basic understanding of network security concepts, knowledge of operating systems and security software, familiarity with firewall and intrusion detection systems, basic skills in encryption and VPNs, and an understanding of common cyber threats and attack vectors.

How important is certification for an entry-level Information Security Specialist?

Certifications are quite important as they validate the knowledge and skills in various aspects of information security. Certifications such as CompTIA Security+, Network+, or the Microsoft MTA Security Fundamentals can be particularly beneficial for entry-level roles.

What soft skills are beneficial for someone in an entry-level information security role?

Key soft skills include strong analytical and problem-solving abilities, effective communication skills to explain technical concepts to non-technical colleagues, attention to detail, and the ability to work under pressure, especially when dealing with security incidents or breaches.

What are the career advancement opportunities for an entry-level Information Security Specialist?

Career advancement can include roles such as Security Analyst, Security Administrator, Penetration Tester, or Network Security Engineer. With experience and additional certifications, one can eventually move into higher roles like Security Manager, Security Architect, or Chief Information Security Officer (CISO). Continuous learning and staying updated with the latest security trends are crucial for career progression in this field.

Add a review
Currently, we are not accepting new reviews
Based on 81 reviews
1-5 of 81 reviews
  1. SJ


  2. AA
  3. K
  4. BO
  5. A

    Smooth delivery and easy access to LMS. Good to see that the LMS offers progress tracking. Would be great if badges were offered on completion of courses to share via Credly to future employers.