HOME > IT & Software > Basic tips to Secure Your IT Corporate Network

Basic tips to Secure Your IT Corporate Network

SynopsisBasic tips to Secure Your IT Corporate Network, available at...
Basic tips to Secure Your IT Corporate Network  No.1

Basic tips to Secure Your IT Corporate Network, available at Free, has an average rating of 3.8, with 6 lectures, based on 216 reviews, and has 9435 subscribers.

Free Enroll Now

You will learn about Top Recommendations to Harden and Strength an IT Network How to Secure and Harden *Servers & AD* How to Secure and Harden *Storage Systems* How to Secure and Harden *Networks and Firewalls* Pentesting Techniques and Steps This course is ideal for individuals who are System Administrators and Engineers or Network and Security Engineers or IT Managers and Leaders It is particularly useful for System Administrators and Engineers or Network and Security Engineers or IT Managers and Leaders.

Enroll now: Basic tips to Secure Your IT Corporate Network

Summary

Title: Basic tips to Secure Your IT Corporate Network

Price: Free

Average Rating: 3.8

Number of Lectures: 6

Number of Published Lectures: 6

Number of Curriculum Items: 6

Number of Published Curriculum Objects: 6

Original Price: Free

Quality Status: approved

Status: Live

What You Will Learn

  • Top Recommendations to Harden and Strength an IT Network
  • How to Secure and Harden *Servers & AD*
  • How to Secure and Harden *Storage Systems*
  • How to Secure and Harden *Networks and Firewalls*
  • Pentesting Techniques and Steps
  • Who Should Attend

  • System Administrators and Engineers
  • Network and Security Engineers
  • IT Managers and Leaders
  • Target Audiences

  • System Administrators and Engineers
  • Network and Security Engineers
  • IT Managers and Leaders
  • In this video series you will learn some basic recommendations that you can put in place to stregnth your IT Security and Network.

    We’ll give you the top tips that you should be putting in place to help mitigate the risks of cybersecurity treats, hackers and malware. We’ll also give you an overview of some of the techniques used by pentesters (ethical hackers).

    The topics that we will cover in this series includes –

    – Server Security Hardening including Active Directory

    – Storage Security Hardening for SAN and NAS

    – Network and Firewall Security Hardening

    – Email Security

    – Hardware Security

    – What does a Penetration Tester (Pentester) do?

    – Important IT Policies and Documents you need to have

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Server Security

    Lecture 2: Network and Firewall Security

    Lecture 3: End-User / Desktop Security

    Lecture 4: Email, Hardware, Process Security

    Lecture 5: WiFi Security

    Lecture 6: Role of Pentester (Ethical Hacker)

    Instructors

  • Basic tips to Secure Your IT Corporate Network  No.2
    Emilio Aguero
    all things tech
  • Rating Distribution

  • 1 stars: 3 votes
  • 2 stars: 5 votes
  • 3 stars: 28 votes
  • 4 stars: 66 votes
  • 5 stars: 114 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!