SKIP THE SHIPPING
Use code NOSHIP during checkout to save 40% on eligible eBooks, now through January 5. Shop now.
Video accessible from your Account page after purchase.
Register your product to gain access to bonus material or receive a coupon.
12 Hours of Video Instruction
Start your cybersecurity career by learning security principles and practices from cybersecurity expert Omar Santos.
The Practical Cybersecurity Fundamentals LiveLessons gives you the core knowledge to start your own cybersecurity journey. This course is suitable for anyone looking to start their journey or anyone who is looking to get a security certification such as CompTIA Security+, Cisco CyberOps Associate, Certified Ethical Hacker (CEH), and GIAC Information.
Omar Santos takes you on a deep dive into Cybersecurity fundamentals with a training full of demos and real-world examples that allow you to test your skills in a practical scenario. Theres never been a better time to get started on your cybersecurity career!
Sign up for cybersecurity live training classes by Omar Santos
Topics covered include:
Skill Level:
Learn How To:
Course requirement:
Who Should Take This Course:
About Pearson Video Training:
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Module 1: Cybersecurity Fundamentals
Lesson 1: Security Principles
Lesson 2: Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts
Lesson 3: Access Control Concepts
Lesson 4: Network Security
Lesson 5: Security Operations
Lesson 6: Software Defined Networking and Infrastructure as Code
Lesson 7: Cryptography
Lesson 8: AAA, Identity Management, Network Visibility, and Segmentation
Module 2: Incident Response, Digital Forensics, and Threat Hunting
Lesson 9: Incident Response Fundamentals
Lesson 10: Threat Hunting Fundamentals
Lesson 11: Digital Forensics
Module 3: Ethical Hacking, Penetration Testing, and Bug Hunting
Lesson 12: Introduction to Security Penetration Testing and Bug Hunting
Lesson 13: Passive Reconnaissance and OSINT
Lesson 14: Active Reconnaissance, Enumeration, and Scanning
Lesson 15: Exploiting Systems and Applications
Lesson 16: Post Exploitation Techniques and Reporting
Module 4: Cloud, DevOps, and IoT Security
Lesson 17: Cloud Security Concepts
Lesson 18: DevSecOps
Lesson 19: IoT Security
Module 5: AI Security, Ethics, and Privacy: Balancing Innovation with Protection
Lesson 20: Introduction to AI Security
Lesson 21: A Deep Dive into the Different Types of AI Threats
Lesson 22: Principles of Secure AI Development