Cisco Core Security: Endpoint Protection and Detection with Cisco AMP
Offered By: Pluralsight
Course Description
Overview
It is imperative to ensure that endpoints are protected, regardless if they are using an organization's network. This course will teach you what makes Cisco AMP for Endpoints a next-generation antimalware solution, and how to implement it.
Endpoints are not always behind an organization's secure network, leaving them more susceptible to various threats. It is more important than ever to ensure that they are protected. In this course, Cisco Core Security: Endpoint Protection and Detection with Cisco AMP, you will gain the ability to learn how to implement Cisco AMP for Endpoints to protect your devices. First, you will learn what makes Cisco AMP for Endpoints a next-generation antimalware solution. Next, you will discover how to assess the posture of your devices, and whether or not it meets your organization's policies. Finally, you will explore how to implement Cisco AMP for Endpoints. When you are finished with this course, you will have the skills and knowledge of Cisco AMP for endpoints, needed to keep your devices secure.
Endpoints are not always behind an organization's secure network, leaving them more susceptible to various threats. It is more important than ever to ensure that they are protected. In this course, Cisco Core Security: Endpoint Protection and Detection with Cisco AMP, you will gain the ability to learn how to implement Cisco AMP for Endpoints to protect your devices. First, you will learn what makes Cisco AMP for Endpoints a next-generation antimalware solution. Next, you will discover how to assess the posture of your devices, and whether or not it meets your organization's policies. Finally, you will explore how to implement Cisco AMP for Endpoints. When you are finished with this course, you will have the skills and knowledge of Cisco AMP for endpoints, needed to keep your devices secure.
Taught by
Craig Stansbury
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity