Course Content

Module 1: Introduction

04:57
1.1 Introduction
05:09
1.2 Intro to System Administration Part 1
08:14
1.3 Intro to System Administration Part 2
06:07
1.4 Intro to Network Engineering Part 1
06:37
1.5 Intro to Network Engineering Part 2
05:14
1.6 Intro to Network Engineering Part 3
06:11
1.7 Intro to Incident Response and Forensics Part 1
10:09
1.8 Intro to Incident Response and Forensics Part 2
08:39
1.9 Intro to Offensive Security and Penetration Testing Part 1
11:18
1.10 Intro to Offensive Security and Penetration Testing Part 2

Module 2: System Administration

02:37
2.1 System Administration Part 1
08:01
2.2 System Administration Part 2
05:57
2.3 System Administration Part 3
06:17
2.4 System Administration Part 4
06:04
2.5 System Administration Part 5
07:15
2.6 System Administration Part 6
07:18
2.7 System Administration Part 7

Module 3: Network Engineering

04:45
3.1 Network Engineering Part 1
06:56
3.2 Network Engineering Part 2
07:53
3.3 Network Engineering Part 3
06:45
3.4 Network Engineering Part 4
06:06
3.5 Network Engineering Part 5
07:31
3.6 Network Engineering Part 6
07:54
3.7 Network Engineering Part 7

Module 4: Incident Response and Forensics

06:29
4.1 Incident Response and Forensics Part 1
04:39
4.2 Incident Response and Forensics Part 2
04:42
4.3 Incident Response and Forensics Part 3
03:02
4.4 Incident Response and Forensics Part 4
08:55
4.5 Incident Response and Forensics Part 5
06:49
4.6 Incident Response and Forensics Part 6

Module 5: Offensive Security and Penetration Testing

04:12
5.1 Offensive Security and Penetration Testing Part 1
08:04
5.2 Offensive Security and Penetration Testing Part 2
05:02
5.3 Offensive Security and Penetration Testing Part 3
09:25
5.4 Offensive Security and Penetration Testing Part 4
07:53
5.5 Offensive Security and Penetration Testing Part 5

Module 6: Summary and Overview

02:07
6.1 Summary and Overview Part 1
04:29
6.2 Summary and Overview Part 2
03:23
6.3 Summary and Overview Part 3
04:48
6.4 Summary and Overview Part 4
03:18
6.5 Summary and Overview Part 5
05:50
6.6 Summary and Overview Part 6
04:31
6.7 Summary and Overview Part 7

Course Description

This FREE intro series will do something very few other training sessions actually do: help you make a career decision. We’ll cover four of the primary disciplines of IT and Security to help you decide which career path is right for you, and we’ll help get you on the right track to succeed in the field of your choice. We will also introduce how Cybrary can help prepare you in the chosen field.

What Does this Beginner IT and Cybersecurity Training Course Cover?

If you are interested in pursuing a career in IT or cybersecurity, then this training course is a great place to start. In this entry-level IT training, you will cover topics like system administration, network engineering, incident response and forensics, and offensive security and penetration testing.

This course was created to provide students with an overview of IT and cybersecurity basics, so they are better able to decide which IT field they want to pursue for a career. We will help you make the right choice and show you how Cybrary can help you advance in the career you’ve selected.

The course is a total of 4 hours and 21 minutes of clock time, and you will receive a Certificate of Completion upon finishing the training.

Why Learn Cybersecurity?

There are many reasons to get into the cybersecurity industry. First and foremost, there is a huge demand for it. Cyber threats and attacks continue to increase, so the demand for professionals to protect data and other digital assets for organizations continues to grow as well. In fact, the demand for cybersecurity professionals is actually growing faster than the number of qualified individuals to fulfill that demand. That means that qualified IT professionals are almost guaranteed to find positions that come with a significant amount of job security. Additionally, most cybersecurity professionals earn a healthy salary, especially as they advance in their careers.

Who Can Learn Cybersecurity?

The Introduction to IT and Cybersecurity training course is ideal for anyone who is interested in the IT or cybersecurity industry. It is an entry level IT course, which means there are no prerequisites, and you don’t have to have any previous IT work experience. It consists of a general overview that will help you as you consider a career in IT or cybersecurity.

Can I Get into Cybersecurity without a Degree?

The quick answer to this question is: yes, you can get into cybersecurity without a degree. In fact, the IT industry has many professionals currently working in it that don’t have degrees. Many IT and cybersecurity personnel have strayed from traditional education paths that lead to four-year (or beyond) degrees. Instead, they are able to pursue careers in cybersecurity by demonstrating that they have the knowledge and core competencies for key roles. Obtaining training and certifications like CompTIA Security+ can be valuable resources in landing cybersecurity jobs without having a degree.

What Jobs are Available in Cybersecurity?

The job outlook for cybersecurity professionals is more favorable than it ever has been. Because it’s such a wide field, there are numerous different jobs that you can pursue in the cybersecurity industry. The following is a list of some of the more common cybersecurity jobs, but keep in mind, job titles can vary from organization to organization:

  • Penetration Tester – professionals who learn how to legally hack into systems, networks, software, etc. to discover vulnerabilities in security
  • Security Generalist – typically an all-around cybersecurity analyst for smaller organizations
  • Security Architect – this IT professional designs, builds, and maintains the implementation of computer and network security for an organization
  • Network Security Engineer – typically a role found in bigger organizations that is responsible for managing the security of the organization’s network software and hardware
  • Cryptographer – creates ways to encrypt sensitive data for individual and corporate privacy
  • Incident Response Analyst – these are the first responders to security breaches or issues
  • Forensic Malware Analyst – this security professional focuses on malware, where it came from, what it does, etc.
  • Security Auditor – this professional is responsible for reporting on an organizations security system’s effectiveness and how it can be improved
  • Security Trainer – trains other security personnel

And many, many more!

Instructed By

Instructor Profile Image
Joe Perry
Instructor
Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor

Provided By

Cybrary Logo

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a Introduction to IT & Cybersecurity Certificate of Completion

Verticals

Data Science

DevSecOps