Reduce Exposure with IT Administrator Training

Level up your technical staff with advanced training to protect your whole organization.
Woman using computer

Are Your IT Administrators Prepared for Today’s Cyber Threats?

In an era of rapidly evolving cyber threats, IT administrators are the first line of defense, protecting your organization's most critical assets. With sophisticated attacks like ransomware and zero-day vulnerabilities, the real challenge isn't just securing systems-it's ensuring your team is equipped to anticipate, identify, and neutralize these threats before they cause damage.

Man Studying

Technical Training from the Leader in Information Security

Security Essentials for IT Administrators offers targeted, role-based training that provides IT admins with the skills and strategies needed to defend against zero-day vulnerabilities, privilege misuse, and ransomware. By focusing on real-world scenarios and up-to-date threat intelligence, this training ensures your team is prepared to secure your organization's most vital systems.

Reduce Your Organization’s Risk of Exposure with Role-Based Training for IT Administrators

A Progressive Learning Path with Real-world Use Cases

The 12 learning modules included in Security Essentials for IT Administrators feature real-world attack and mitigation scenarios while progressing learners along an increasingly complex training path.

OverviewExamining common beliefs vs realities of cyber-attacks with an introduction to specific responsibilities of cyber security practitioners.
Core PrinciplesFocusing on three core principles of cyber security. The Principle of Least Privilege, The CIA Triad, and the principle of Prevent, Detect, Respond.
Security Program ManagementLearn how threats, vulnerabilities, countermeasures, laws, and compliance requirements inform Risk Management Programs.
Security MaintenanceCovers security hygiene practices that include practicing change control and configuration management; integrating security into SDLC; patch management; active threat hunting; and more.
Authentication and AuthorizationLearn how to strengthen security with passphrases, password managers, and 2FA. This module covers best practices like using spaces in passphrases, setting permissions based on the Principle of Least Privilege, and understanding the Zero Trust Model.
Data ProtectionCovering the effective deployment of encryption methods such as the Advanced Encryption Standard algorithm, Transport Layer Security, Internet Protocol Security, Virtual Private Networks, key management fundamentals, and Zero-Knowledge implementations.
Sample AttacksExplore key attacks such as Social Engineering, Spear Phishing, Malware, and Denial of Service. This module also delves into advanced threats like QR Code Attacks, Teams Phishing, and AI-driven tactics, highlighting the crucial role of humans as the final line of defense.
Attack ScenarioAn attack scenario is followed from start to finish, the training focuses on the need for changing our methods of detection and response as attack methods change.
Attack MitigationDiscover how to respond when a cyber-attack occurs, including deploying technologies to restore operations and fix underlying issues. This module highlights the use of AI tools to enhance threat detection, malware analysis, incident response, and vulnerability management.
Cloud Computing EnvironmentsExplore cloud environments, their respective security concerns, and best practices for secure deployments while examining the security advantages to cloud environments.
Securing Web ServersReviews each of the Open Web Application Security Project (OWASP) top vulnerabilities and how security practitioners can prevent and/or mitigate issues in each category.
Supply Chain AttacksExamine real-world supply chain attacks to understand their causes and how to prevent or mitigate them. This module emphasizes learning from past incidents to strengthen defenses against future threats.