Information and Cyber Security Foundations

Paths

Information and Cyber Security Foundations

Author: Aaron Rosenmund

Welcome to the introductory skill path for hands-on technical skills in cyber security.

In this skill path, you will cover the basics of Windows and... Read more

  • Linux Endpoint Security Operations Foundations
  • Windows Endpoint Security Operations Foundations

Pre-requisites

An interest in information and cyber security, that's it!

Endpoint Security Operations

In this section, you are introduced to Linux & Windows tools and commands used to access different operating system components. Understanding how to use existing tools on endpoint systems to detect or emulate threat actor activity is instrumental to your knowledge of more advanced security operations capabilities. You are shown what "normal" looks like for each OS component, then guided through identifying anomalous activity in a live environment.

Getting Started in the Lab Environment

by Aaron Rosenmund

Oct 7, 2021 / 6m

6m

Start Course
Description

Getting Started in the Lab Environment

Table of contents
  1. Getting Started in the Lab Environment
Learning Paths

Information and Cyber Security Foundations

  • Number of Courses1 courses
  • Duration0 hours

Welcome to the introductory skill path for hands-on technical skills in cyber security.

In this skill path, you will cover the basics of Windows and Linux, networking, and applications that are often defined as “implied” knowledge for security professionals. Most of these skills focus on defense, but offensive use of similar capabilities are also covered. This duality of perspective provides a well-rounded understanding of the problem sets covered in more advanced professional roles. The use of native operating system functions, basic network protocols, and common application mechanics is critical for all roles within cyber security. This path is the gateway from conceptual understanding to the technical application of cyber security skills within specific job roles. The skills learned in this path are heavily focused on hands-on learning, allowing you to gain experience and experiment in a safe environment.

Courses in this path

Endpoint Security Operations

In this section, you are introduced to Linux & Windows tools and commands used to access different operating system components. Understanding how to use existing tools on endpoint systems to detect or emulate threat actor activity is instrumental to your knowledge of more advanced security operations capabilities. You are shown what "normal" looks like for each OS component, then guided through identifying anomalous activity in a live environment.

Join our learners and upskill
in leading technologies