Intermediate PC Security
Offered By: Cybrary
Course Description
Overview
In this course, students will also learn about UEFI BIOS, malware, and ways to protect against attacks.
Target Audience
People that will benefit the most from this course are:
- IT professionals
- IT managers
- IT security specialists that want to add another specialization
- IT Security Managers and ISOs
Prerequisites
- Basic PC Architecture
- Basics of company level PC fleet management
- Physical PC security (look at Asset Security Fundamentals on Cybrary)
Course Goals
By the end of this course, students should be able to:
- Know the importance of PC security.
- Know how to protect your PCs on hardware level?
- How to protect OS, programs/applications and data on your PCs?
Syllabus
- Introduction
- Introduction
- Importance of PC Security
- Specifics of PC Security
- Attack Surface Part 1
- Attack Surface Part 2
- Attack Vectors Part 1
- Attack Vectors Part 2
- Goal of PC Security
- Importance of PC Security Recap
- Protecting the PC Hardware
- PC Architecture in Detail Part 1
- PC Architecture in Detail Part 2
- UEFI BIOS in Detail Part 1
- UEFI BIOS in Detail Part 2
- UEFI Malware Part 1
- UEFI Malware Part 2
- Protection of PC Hardware Part 1
- Protection of PC Hardware Part 2
- Physical PC Protection
- Protecting the PC Hardware Recap
- UEFI Setup Demo
- Protecting the OS
- Types of Attacks on OS
- Protecting User Authentication
- Windows Hello Authentication Demo
- Anti-Malware Protection
- Protection of Anti-Malware
- Firewall
- Security Policies
- Protecting Programs/Applications
- Attack Vectors to Programs
- Limiting User's Rights
- Protecting Browsing
- Protecting Programs
- Conclusion
- Course Recap
Taught by
Milan Cetic
Related Courses
Detecting and Mitigating Cyber Threats and AttacksUniversity of Colorado System via Coursera Secure Networked System with Firewall and IDS
University of Colorado System via Coursera Networking in Google Cloud: Fundamentals
Google Cloud via Coursera Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn Introduction to Cybersecurity Tools & Cyberattacks
IBM via Coursera