Network and Cloud Security

Network and Cloud Security

Video Training

If you share resources across your network or the cloud, you need a firm grasp of all of the security implications. In this Learning Path, you’ll get hands-on experience securing your infrastructure while learning about risk assessment and management, sensitive data, computer forensics, penetration testing, and much more. By the end of this course, you’ll know how to secure your data and keep it that way.


Strong system administration experience and familiarity with security

Below are the video training courses included in this Learning Path.


Learning Linux Security

Presented by Ric Messier 6 hours 13 minutes

In this hands-on course you’ll learn to secure a Linux system. You’ll start by learning about booting, then jump into covering service management. From there, you’ll dive into logging and log management, intrusion detection and preventions, and users and permissions. You’ll learn about utilities and the Linux Kernel, including Kernel modules, builds, managing Kernel parameters, and firewalls. By this end of this course, you’ll have a well-rounded foundation in Linux security.


Securing Cloud Services

Presented by David Miller 6 hours 39 minutes

With this segment of your Learning Path, you’ll get a clear understanding of potential security benefits and risks associated with cloud computing. You’ll begin by securing your infrastructure, including risk assessment and management, sensitive data, and data classification. From there, you’ll prepare for cloud use, covering web app security, security as a service, and security controls. Once you have completed this course, you will be fully capable of securing your own IT assets in the cloud.


Computer Forensics

Presented by Ric Messier 10 hours 55 minutes

Computer Forensics is a broad topic that touches on many different skills specific to answering legal or investigative questions in relation to a computer. This course provides an overview of the skills you’ll need to work in this highly technical field, covering many topics, from preparing for an investigation, to ethics, to evidence acquisition, being an expert witness, and legal vs. corporate investigations. You’ll learn about forensic tools and how they are used. By the end, you’ll have a clear understanding of what it takes to be a computer forensics investigator.


Reverse Engineering and Exploit Development

Presented by Philip Polstra 6 hours 4 minutes

In this course, you’ll learn about common software vulnerabilities and how to find them, as well as how vulnerabilities differ between various operating systems. You’ll start by reversing compiled Windows applications, and then move on to reverse compiled OS X, Linux, and Android applications. As you work through the course you’ll discovre how to find website and database vulnerabilities, and others. Finally, you’ll learn about simple exploits, web exploitation, and ARM exploitation.


Professional Guide to Wireless Network Hacking and Penetration Testing

Presented by Ric Messier 4 hours 51 minutes

This course will equip you with the tools and techniques needed to effectively secure your 802.11 and Bluetooth networks. You’ll start with the basics of 802.11, such as frequencies, access points, associations, and enterprise networks. From there, you’ll learn how to secure your own wireless network. You’ll get a tour of wireless attack tools and wireless attacks before moving on to Bluetooth security. Finally, you’ll look at other wireless communications, such as WiMax, ZigBee, and RFID.