
Finally, Lisa discusses countermeasures security professionals can take to address these attacks. She discusses the concept of “misuse of trust”-how hackers use charm, power, and influence to penetrate an organization-and why you need to be extra cautious with the disgruntled employee. In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. In order to protect their networks, IT security professionals need to understand social engineering, who is targeted, and how social engineering attacks are orchestrated. GO TO TRAINING Ethical Hacking: Social Engineeringĭescription: Social engineering is a technique hackers use to manipulate end-users and obtain information about an organization or computer systems.

#LINKEDIN COURSES 2021 HOW TO#
Finally, she discusses how to choose and work with an outsourced pen-testing organization, which can bring a valuable outsider’s perspective to your IT security efforts.
#LINKEDIN COURSES 2021 MANUAL#
manual testing-and the techniques and blueprints a pen tester should use to test everything from Wi-Fi to VoIP. She also defines the various types of “pen” tests-such as black, grey, and white box, announced vs. Cybersecurity expert Lisa Bock reviews the steps involved in performing a worthwhile penetration test, including auditing systems, listing and prioritizing vulnerabilities, and mapping out attack points a hacker might target. Penetration testing is the process to check if a computer, system, network, or web application has any vulnerabilities. This course looks at one of the most important skills of any IT security professional: penetration testing. However, the only way to know if your defenses will hold is to test them. GO TO TRAINING Ethical Hacking: Penetration Testingĭescription: You’ve done everything you can to logically secure your systems, along with layering in user education and providing physical security. Author Mike Chapple, an IT leader with over 15 years of experience, also covers the processes for discovering and mitigating threats and attacks, and conducting penetration testing and scanning for vulnerabilities. By learning about malware, networking and application security exploitations, and social engineering, you’ll be prepared to answer questions from the exam-and strengthen your own organization’s systems and defenses. This course prepares exam candidates for the critical Threats, Attacks, and Vulnerabilities domain of the exam. The latest version, SY0-501, expands coverage of cloud security, virtualization, and mobile security. The 11 Best Cybersecurity LinkedIn Learning Courses for 2021 CompTIA Security+ (SY0-501) Cert Prep: 1 Threats, Attacks, and Vulnerabilitiesĭescription: The CompTIA Security+ exam is an excellent entry point for a career in information security. Click GO TO TRAINING to learn more and register for these Cybersecurity LinkedIn Learning courses.


For our audience, the editors of Solutions Review compiled this list of the 12 Best Cybersecurity LinkedIn Learning Courses available now. Each course in its catalog is taught by industry experts in software, creative, and business skills. LinkedIn Learning is LinkedIn’s own video course website.
