Study any time, from any device.

Learn Cybersecurity Administration

The Cybersecurity Administration skill path covers a variety of high-level tasks related to cybersecurity, including implementing identity and access management, understanding asset security, integrating enterprise security, performing assessments and more.

17 courses  //   93 videos  //   9 hours of training

Cybersecurity Administration training

This learning path builds your knowledge and skills around cybersecurity administration. As you progress through 17 courses, you’ll learn about industry risks and how to measure and control those risks, as well as more technical topics such as networking, cryptography and integrating various types of technologies so that they work together to protect an organization. Upon completion, you’ll have a thorough understanding of the administrative side of cybersecurity that you can carry over to your next role or project.

Learning path components

Risk Metric Scenarios
Course
Risk Metric Scenarios

Risk Metric Scenarios

This course on risk metric scenarios covers analyzing scenarios to secure enterprises and reviewing existing security.

2 videos
13 minutes of training

Vulnerability Assessment Methods and Tools
Course
Vulnerability Assessment Methods and Tools

Vulnerability Assessment Methods and Tools

This course helps you broaden your understanding of vulnerability assessment and tools, including tool lists and test types.

2 videos
21 minutes of training

Software Vulnerabilities and Security Controls
Course
Software Vulnerabilities and Security Controls

Software Vulnerabilities and Security Controls

In this course, we take you through the fundamentals of software vulnerabilities and security controls.

4 videos
37 minutes of training

Integrating Cloud and Virtualization Technologies
Course
Integrating Cloud and Virtualization Technologies

Integrating Cloud and Virtualization Technologies

In this course, you'll get to grips with the challenges of integrating cloud and virtualization technologies. Includes vocabulary and guidelines.

4 videos
33 minutes of training

Integrating Hosts, Storage, Networks and Applications
Course
Integrating Hosts, Storage, Networks and Applications

Integrating Hosts, Storage, Networks and Applications

Put the pieces together with this course on integrating hosts, storage, networks and applications. Includes vocabulary and guidelines.

3 videos
28 minutes of training

Incident Response and Recovery Procedures
Course
Incident Response and Recovery Procedures

Incident Response and Recovery Procedures

Prepare for possible trouble with this course on incident response and recovery procedures, including designing systems to facilitate incident response.

2 videos
17 minutes of training

Integrating Authentication and Authorization Technologies
Course
Integrating Authentication and Authorization Technologies

Integrating Authentication and Authorization Technologies

Review and update your knowledge of integrating authentication and authorization technologies with this course covering advanced identity management and more.

4 videos
22 minutes of training

Implementing Cryptographic Techniques
Course
Implementing Cryptographic Techniques

Implementing Cryptographic Techniques

Brush up on your understanding of implementing cryptographic techniques with this course covering cryptographic design, techniques and implementations.

6 videos
30 minutes of training

Securing Communications and Collaboration Solutions
Course
Securing Communications and Collaboration Solutions

Securing Communications and Collaboration Solutions

Secure your communications and collaboration solutions with this course covering BYOD, mobile device management and more.

1 video
15 minutes of training

Asset Security
Course
Asset Security

Asset Security

Learn how to secure sensitive data, including managing and classifying data, working with data at rest and in transit, and implementing data security controls.

7 videos
39 minutes of training

Risk Mitigation Strategies and Controls
Course
Risk Mitigation Strategies and Controls

Risk Mitigation Strategies and Controls

Dive into risk mitigation strategies and controls with this course on risk scenarios, responses and more.

4 videos
27 minutes of training

Business and Industry Influences and Risks
Course
Business and Industry Influences and Risks

Business and Industry Influences and Risks

Brush up on your knowledge of business and industry influences and risks with this course on enterprise risk management (ERM) and business models.

2 videos
16 minutes of training

Security Assessment
Course
Security Assessment

Security Assessment

Discover any weak spots in your cyber defense. Learn how to use security assessments to identify, analyze and report on an organization's cyber risk.

5 videos
21 minutes of training

Access Control Fundamentals
Course
Access Control Fundamentals

Access Control Fundamentals

Take a deep dive into one of the fundamental concepts of security: access control. Learn how to give the right people access to the right information in a secure way.

22 videos
97 minutes of training

Secure Network Design
Course
Secure Network Design

Secure Network Design

Explore key concepts behind secure network design, including tools to keep threats out and techniques to detect and deflect intruders that breach your defenses.

6 videos
26 minutes of training

WAN & Remote Access Security
Course
WAN & Remote Access Security

WAN & Remote Access Security

Learn about securing wide area networks (WAN) and remote access against different types of cyber threats in this five-video course.

5 videos
35 minutes of training

Network Fundamentals
Course
Network Fundamentals

Network Fundamentals

Go in-depth into networking devices and technologies. Explore network types, protocols, models, attacks, security and more.

14 videos
80 minutes of training

 

What you’ll learn.

  • Enterprise risk and controls
  • Vulnerability identification, tools and metrics
  • Network devices, technologies and secure design
  • Securing sensitive data
  • Implementing access controls
  • Implementing cryptography
  • Security standards, design and integration
  • WAN, remote access and cloud security

Who is this for?

At least two to three years of information security experience and a thorough understanding of foundational security concepts are recommended.

This skill path is designed for:

  • Cybersecurity administrators
  • Network administrators
  • Cybersecurity managers
  • Cybersecurity consultants
  • Anyone with a desire to build their security management skills

You're in good company

"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had." 

James Coyle

FireEye, Inc.

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer