Master essential cybersecurity concepts including risk management, authentication, encryption, and incident response for IT professionals.
Master essential cybersecurity concepts including risk management, authentication, encryption, and incident response for IT professionals.
This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full Akamai Customer Consulting and Support Professional Certificate or Akamai Network Engineering Professional Certificate program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.
4.8
(13 ratings)
2,251 already enrolled
Instructors:
English
What you'll learn
Master security and risk management fundamentals
Implement identity and access management controls
Understand cryptography and encryption techniques
Develop incident response and recovery plans
Perform vulnerability assessments and security audits
Skills you'll gain
This course includes:
5.8 Hours PreRecorded video
27 quizzes
Access on Mobile, Tablet, Desktop
FullTime access
Shareable certificate
Get a Completion Certificate
Share your certificate with prospective employers and your professional network on LinkedIn.
Created by
Provided by

Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.





There are 9 modules in this course
This comprehensive course covers fundamental IT security concepts and practices. Students learn about security management, risk assessment, authentication, encryption, and network security. The curriculum includes hands-on labs and real-world applications of security concepts, from device hardening to incident response. Topics span physical security, cryptography, wireless security, ethical hacking, and business continuity planning.
Security Fundamentals
Module 1 · 2 Hours to complete
Authentication and Account Management
Module 2 · 2 Hours to complete
Device Security
Module 3 · 1 Hours to complete
Encryption
Module 4 · 2 Hours to complete
Security Management
Module 6 · 2 Hours to complete
Security Threats
Module 7 · 2 Hours to complete
Managing Security Incidents
Module 8 · 2 Hours to complete
Capstone
Module 9 · 1 Hours to complete
Fee Structure
Instructor
Technical Trainer and Author
Shadow Farrell is a seasoned technical trainer with twenty years of experience in enterprise environments, including AIG and Johnson & Johnson. Mr. Farrell earned a Bachelor of Science with Highest Distinction in Organizational Management from Nyack College, a Bachelor of Science in Network Design and Management from Western Governors University, and a Master of Fine Arts in Writing from Spalding University.
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.