Featured resource
Tech Upskilling Playbook 2025
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Learn more
  • Path icon Learning Path
  • Libraries: This path is only available in the libraries listed. To access this path, purchase a license for the corresponding library.
  • Security

Information and Cyber Security Foundations

15 Courses
14 Labs
31 Hours
Skill IQ

## Welcome to the introductory skill path for hands-on technical skills in cyber security. In this skill path, you will cover the basics of **Windows** and **Linux**, **networking**, and **applications** that are often defined as “implied” knowledge for security professionals. Most of these skills focus on **defense**, but **offensive** use of similar capabilities are also covered. This duality of perspective provides a well-rounded understanding of the problem sets covered in more advanced professional roles. The use of native operating system functions, basic network protocols, and common application mechanics is critical for all roles within cyber security. This path is the gateway from conceptual understanding to the technical application of cyber security skills within specific job roles. The skills learned in this path are heavily focused on hands-on learning, allowing you to gain experience and experiment in a safe environment.

Content in this path

Linux Endpoint Security Foundations

In this section, you are introduced to Linux tools and commands used to access different operating system components. Understanding how to use existing tools on endpoint systems to detect or emulate threat actor activity is instrumental to your knowledge of more advanced security operations capabilities. You are shown what "normal" looks like for each OS component, then guided through identifying anomalous activity in a live environment.

Windows Endpoint Security Foundations

In this section, you are introduced to Windows tools and commands used to access different operating system components. Understanding how to use existing tools on endpoint systems to detect or emulate threat actor activity is instrumental to your knowledge of more advanced security operations capabilities. You are shown what "normal" looks like for each OS component, then guided through identifying anomalous activity in a live environment.

Network Protocols for Security Foundations

In this section, you will find introductions to some common network protocols, and why this knowledge is useful for security professionals. These are the protocols that enable the internet and allow for all the connections between machines and people. Understanding how they work, and sometimes more importantly, how they don't work, is instrumental to your knowledge of more advanced security operations capabilities. Enjoy!

Try this learning path for free
Access this learning path and other top-rated tech content with a free trial.
What You'll Learn
  • Linux Endpoint Security Operations Foundations
  • Windows Endpoint Security Operations Foundations
  • Network Protocols for Security Foundations
Prerequisites
  • An interest in information and cyber security, that's it!
Related topics
  • Incident Response
  • Security Event Triage
  • Security Analyst
  • Penetration Testing
  • Red Team Operator
Not sure where to start?
With over 500 assessments to choose from, you can see where your skills stand and receive adaptive learning recommendations to fill knowledge gaps in as little as 10 minutes.
Learn more

Join our learners and upskill
in leading technologies