Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out

Security Essentials for IT Professionals

Course Summary

This course provides IT professionals with the foundational knowledge and hands-on skills needed to assess and improve the security posture of enterprise environments. Learners will explore core principles of cybersecurity, analyze threats and vulnerabilities, implement secure architectures, and carry out daily security operations. The curriculum also introduces governance, risk, and compliance practices, preparing participants to contribute effectively to organizational security programs and respond proactively to evolving cyber threats.

Prerequisites
In order to succeed in this course, participants will need:

  • Prior experience in network administration or system administration
Purpose
Gain an understanding of security programs and how to respond to cyber threats
Audience
Any IT professional interested in improving their security skills
Role
IT Professionals | System and Network Administrators | Technical Managers and staff
Skill level
Introduction
Style
Lecture } Hands-on Activities | Labs
Duration
5 days
Related technologies
Networking 

 

Learning objectives
  • Explain the core principles of cybersecurity
  • Identify and mitigate threats and vulnerabilities
  • Implement secure architectures
  • Execute daily security operations including vulnerability management, monitoring, and incident response
  • Apply governance, risk, and compliance principles in security program management

What you'll learn:

In this Security Essentials for IT Professionals course, you'll learn:

General Security Concepts

  • CIA triad: confidentiality, integrity, availability
  • Risk management and analysis
  • Threat actors and threat intelligence
  • Security controls (technical, managerial, operational, physical)
  • Zero Trust architecture and security frameworks
  • Change management and security considerations
  • Cryptography concepts: encryption, hashing, digital signatures, PKI
  • Deception and disruption technologies

Threats, Vulnerabilities, and Mitigations

  • Common threat vectors and attack surfaces
  • Malware, trojans, and ransomware
  • Social engineering attacks including phishing, vishing, and smishing
  • Application attacks including buffer overflows, SQL injection, and XSS
  • Network attacks such as DDoS, DNS poisoning, and man-in-the-middle
  • Password and cryptographic attacks
  • Indicators of compromise (IoCs)
  • Mitigation and remediation strategies

Security Architecture

  • Secure network architectures: segmentation, VLANs, DMZs
  • Secure cloud and virtualization concepts (IaaS, PaaS, SaaS)
  • Zero Trust and Secure Access Service Edge (SASE)
  • Secure software development practices (SDLC)
  • Data security and privacy controls including DLP and encryption
  • Securing IoT, mobile, and embedded devices
  • Resilience and high availability strategies such as backups and disaster recovery

Security Operations

  • Vulnerability management processes
  • Security monitoring with SIEM and EDR
  • Asset management for hardware and software
  • Identity and access management (IAM), including MFA and SSO
  • Incident response lifecycle: preparation through recovery
  • Digital forensics and evidence handling
  • Security automation and orchestration with SOAR
  • Wireless and mobile device security with MDM

Security Program Management and Oversight

  • Principles of effective security governance
  • Risk management frameworks (NIST, ISO)
  • Third-party and vendor risk management
  • Compliance, audits, and assessments
  • Security awareness training and culture building
  • Business continuity and disaster recovery planning
  • Legal and regulatory compliance requirements (GDPR, HIPAA)

Dive in and learn more

When transforming your workforce, it’s important to have expert advice and tailored solutions. We can help. Tell us your unique needs and we'll explore ways to address them.

Let's chat

By filling out this form and clicking submit, you acknowledge our privacy policy.