Intermediate Endpoint Security
Offered By: Cybrary
Course Description
Overview
Students will learn security concerns with BYOD, the concept of least privilege, and how to protect data.
Target Audience
People that will benefit the most from this course are:
- IT professionals
- IT managers
- IT security specialists that want to add another specialization
- IT Security Managers and ISOs
Prerequisites
- Basic PC Architecture
- Knowledge of the vital importance of endpoint security (look for Endpoint Security Fundamentals course on Cybrary)
- Basics of company level PC fleet management
Course Goals
By the end of this course, students should be able to know:
- What are the goals of endpoint security?
- How to structure Endpoint protection in your company?
- How to manage your company’s PC fleet’s security?
Syllabus
- Introduction
- Introduction
- Goal of Endpoint Security
- Importance of Endpoint Security
- Endpoint Devices Covered in this Course
- Goals of Endpoint Security
- Protecting the Hardware of the PC Part 1
- Protecting the Hardware of the PC Part 2
- Protecting Printing Devices
- Protecting OS
- Protecting Programs
- Protecting Networks
- Protecting Users
- Goal of Endpoint Security Recap
- Manage and Control
- What do you Need to Manage Part 1
- What do you Need to Manage Part 2
- Fleet Planning, BYOD and CYOD
- Least Privilege Approach
- Process Management
- Manage and Control Recap
- Protecting Data
- Protecting Data from Theft
- Protecting Data from Destruction/Loss
- Data Protection Recap
- Conclusion
- Course Recap
Taught by
Milan Cetic
Related Courses
PCI DSS: Restricting Access to Cardholder DataPluralsight OWASP Top 10: #1 Injection and #2 Broken Authentication
LinkedIn Learning OWASP Top 10: #1 Broken Access Control and #2 Cryptographic Failures
LinkedIn Learning Demystifying Zero Trust - DefCamp - 2021
DefCamp via YouTube Privacy Engineering: Not Just for Privacy Engineers
USENIX Enigma Conference via YouTube