Intermediate Endpoint Security
Offered By: Cybrary
Course Description
Overview
Students will learn security concerns with BYOD, the concept of least privilege, and how to protect data.
Target Audience
People that will benefit the most from this course are:
- IT professionals
- IT managers
- IT security specialists that want to add another specialization
- IT Security Managers and ISOs
Prerequisites
- Basic PC Architecture
- Knowledge of the vital importance of endpoint security (look for Endpoint Security Fundamentals course on Cybrary)
- Basics of company level PC fleet management
Course Goals
By the end of this course, students should be able to know:
- What are the goals of endpoint security?
- How to structure Endpoint protection in your company?
- How to manage your company’s PC fleet’s security?
Syllabus
- Introduction
- Introduction
- Goal of Endpoint Security
- Importance of Endpoint Security
- Endpoint Devices Covered in this Course
- Goals of Endpoint Security
- Protecting the Hardware of the PC Part 1
- Protecting the Hardware of the PC Part 2
- Protecting Printing Devices
- Protecting OS
- Protecting Programs
- Protecting Networks
- Protecting Users
- Goal of Endpoint Security Recap
- Manage and Control
- What do you Need to Manage Part 1
- What do you Need to Manage Part 2
- Fleet Planning, BYOD and CYOD
- Least Privilege Approach
- Process Management
- Manage and Control Recap
- Protecting Data
- Protecting Data from Theft
- Protecting Data from Destruction/Loss
- Data Protection Recap
- Conclusion
- Course Recap
Taught by
Milan Cetic
Related Courses
Introduction to Azure VMware Cloud SolutionA Cloud Guru Administración de las Tecnologías de la Información
Universidad de Palermo via Coursera Amazon Simple Storage Service (Amazon S3) Block Public Access (Korean)
Amazon Web Services via AWS Skill Builder Amazon WorkSpaces Deep Dive (Japanese)
Amazon Web Services via AWS Skill Builder Amazon WorkSpaces Deep Dive (Traditional Chinese)
Amazon Web Services via AWS Skill Builder