Intermediate Endpoint Security
Offered By: Cybrary
Course Description
Overview
Students will learn security concerns with BYOD, the concept of least privilege, and how to protect data.
Target Audience
People that will benefit the most from this course are:
- IT professionals
- IT managers
- IT security specialists that want to add another specialization
- IT Security Managers and ISOs
Prerequisites
- Basic PC Architecture
- Knowledge of the vital importance of endpoint security (look for Endpoint Security Fundamentals course on Cybrary)
- Basics of company level PC fleet management
Course Goals
By the end of this course, students should be able to know:
- What are the goals of endpoint security?
- How to structure Endpoint protection in your company?
- How to manage your company’s PC fleet’s security?
Syllabus
- Introduction
- Introduction
- Goal of Endpoint Security
- Importance of Endpoint Security
- Endpoint Devices Covered in this Course
- Goals of Endpoint Security
- Protecting the Hardware of the PC Part 1
- Protecting the Hardware of the PC Part 2
- Protecting Printing Devices
- Protecting OS
- Protecting Programs
- Protecting Networks
- Protecting Users
- Goal of Endpoint Security Recap
- Manage and Control
- What do you Need to Manage Part 1
- What do you Need to Manage Part 2
- Fleet Planning, BYOD and CYOD
- Least Privilege Approach
- Process Management
- Manage and Control Recap
- Protecting Data
- Protecting Data from Theft
- Protecting Data from Destruction/Loss
- Data Protection Recap
- Conclusion
- Course Recap
Taught by
Milan Cetic
Related Courses
Windows 10 Security FeaturesMicrosoft via edX Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera Cybersecurity Compliance Framework & System Administration
IBM via Coursera Cybersecurity Compliance and Framework
IBM via edX Securing Microsoft Azure Data Access Endpoints
Pluralsight