CBTNuggets – ISACA ITCA: Cybersecurity Fundamentals Online Training 2024-6
CBTNuggets – ISACA ITCA: Cybersecurity Fundamentals Online Training 2024-6

ISACA ITCA: Cybersecurity Fundamentals Online Training. This comprehensive course teaches you how to perform essential and professional information security tasks as an entry-level cybersecurity professional. Whether you are looking to earn the ITCA Cybersecurity Fundamentals certification or want to expand your cybersecurity knowledge, this course is for you. In this course, you will learn about the threats in the digital world and how to combat them, and how to respond in the event of a cyberattack. This course is intended as an introductory course and is not suitable for cybersecurity professionals seeking advanced knowledge.
What you will learn:
- Identifying Organizational Assets and Cyber Threats: Learn how to recognize an organization’s valuable assets and the threats that threaten them.
- Providing a basic level of information security: learning the basics of information protection.
- Performing basic security operations: Learning how to perform everyday security tasks.
- Responding appropriately to security incidents: Learn how to respond to cyberattacks and security incidents.
- Threat landscape monitoring: Learning how to identify unusual behavior in systems.
Who is this course suitable for?
- Those who want to earn ITCA certification: This course is essential for those who plan to earn the ITCA Cybersecurity Fundamentals certification.
- Beginner IT Professionals: This course is useful for IT professionals with at least one year of experience working with security tools.
- Experienced Cybersecurity Professionals: Experienced professionals can also use this course to update their knowledge.
ISACA ITCA: Cybersecurity Fundamentals Online Training Course Details
- Publisher: CBTNuggets
- Instructor: James Conrad
- Training level: Beginner
- Training duration: 22 hours and 35 minutes
- Number of lessons: 179
Course topics
- 1. Defining Security and its Roles
- 2. Roles, Governance, Continuity, and Recovery
- 3. CIA, Least Privilege, and Privacy
- 4. Threat Landscape
- 5. Motivations, Agents, and the Attack Sequence
- 6. Malware and its Symptoms
- 7. Common Attack Methods Part 1
- 8. Common Attack Methods Part 2
- 9. Risk Management
- 10. Regulatory Requirements, The Modern Perimeter
- 11. Network Security Controls
- 12. Understand Firewall Functions
- 13. Endpoint Firewalls and Windows Firewall
- 14. MacLinux Firewalls and IDSIPS
- 15. AAA Controls
- 16. Cloud Services
- 17. Cloud Security and Models
- 18. Data Security
- 19. Symmetric Encryption
- 20. Asymmetric Encryption, Hashing, Digital Signatures
- 21. PKI and Applying Cryptography
- 22. Security Operations and Vulnerability Management
- 23. Penetration Testing and EDR
- 24. Incident Response and Digital Forensics
- 25. Network Command-Line Tools
- 26. Penetration Testing Tools
- 27. Concluding Tools and Techniques
Course images
Sample course video
Installation Guide
After Extract, view with your favorite player.
Subtitles: None
Quality: 1080p
Download link
File(s) password: www.downloadly.ir
File size
36.8 GB