YoVDO

Chromebooks and Network Motes: Enforcing Security Posture from Device to Cloud

Offered By: OWASP Foundation via YouTube

Tags

Network Security Courses Device Security Courses Cloud Security Courses Enterprise Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive security strategy using Chromebooks and network motes to enforce security posture from device to cloud in this 31-minute OWASP Foundation talk. Discover how to balance developer productivity with robust security measures, addressing the challenges of providing secure access to high-stakes production environments while granting admin rights on personal devices. Learn from the speaker's experience in implementing Chromebooks as a solution, including the technical hurdles encountered and overcome. Gain insights into protecting against malware, phishing, and credential theft while establishing secure zones and implementing a two-laptop approach. Understand the practical implications of this security model and the valuable lessons learned throughout the implementation process.

Syllabus

Intro
The Attacks
Dedicated Secure Device
Better security is possible
Outline
Scorecard
Malware
Phishing
Credential Theft
Secure Zone
Put it all together
Setup Step 1
Setup Step 2
Setup Step 3
How does Two Laptops Work in Practice?
Lessons
The End


Taught by

OWASP Foundation

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity