Computer Fundamentals: Security
Offered By: Pluralsight
Course Description
Overview
Any aspiring computer technician must know how to implement security. From physical and logical security concepts to the details of secure protocols, malware protection, and authentication, this course discusses all aspects of computer security.
Aspiring computer technicians must be able to implement security, one of the most important concerns of any IT organization. In this course, Computer Fundamentals: Security, youlll learn the fundamentals of all aspects of computer security. First, you’ll discover elements of physical security such as locks, badges, smartcards and hardware tokens. Then, you’ll learn about secure authentication, “least privilege” protection, permissions, and encryption, with a focus on wireless security and malware prevention, including social engineering attacks such as phishing. Finally, you'll see the laundry list of best practices for securing workstations, mobile devices, and SOHO routers. When you’re finished with this course, you'll be well prepared to implement strong security measures in your organization and prevent the most common security threats from damaging your organization’s systems, data, and people.
Topics:
Aspiring computer technicians must be able to implement security, one of the most important concerns of any IT organization. In this course, Computer Fundamentals: Security, youlll learn the fundamentals of all aspects of computer security. First, you’ll discover elements of physical security such as locks, badges, smartcards and hardware tokens. Then, you’ll learn about secure authentication, “least privilege” protection, permissions, and encryption, with a focus on wireless security and malware prevention, including social engineering attacks such as phishing. Finally, you'll see the laundry list of best practices for securing workstations, mobile devices, and SOHO routers. When you’re finished with this course, you'll be well prepared to implement strong security measures in your organization and prevent the most common security threats from damaging your organization’s systems, data, and people.
Topics:
- Course Overview
- Physical Security
- Logical Security
- Wireless Authentication and Encryption
- Malware Prevention
- Social Engineering, Threats, and Vulnerabilities
- Permissions and Encryption in Windows
- Securing Workstations: Best Practices
- Securing Mobile Devices
- Decommissioning Storage Securely
- Securing SOHO Networks
Taught by
Glenn Weadock
Related Courses
FinTech for Finance and Business LeadersACCA via edX Access Controls
(ISC)² via Coursera Advanced Cyber Security Training
EC-Council via FutureLearn Python для кибербезопасности. Финальный проект
E-Learning Development Fund via Coursera Advanced System Security Design
University of Colorado System via Coursera