Free
Endpoint Security Fundamentals
This course is about basics in Endpoint Security. In it, you will learn why endpoint security today is of such importance and basic terminology used in this field. Also, you will learn about threats that are existing today related to endpoints and what solutions and tools exist on the market that can help you defend from all kinds of attacks.
2
H
10
M
Time
intermediate
difficulty
2
ceu/cpe
Course Content
1.0 Introduction
Module 1: Introduction
2.1 Who/What are you up Against?
Module 2: Threat Landscape
3.1 Antiviruses
Module 3: Market Offerings
4.1 Talking to Management
Module 4: How to Protect Yourself
5.1 Course Summary
Module 5: Course Summary
1.1 Technology
Module 1: Introduction
2.2 What do They Want?
Module 2: Threat Landscape
3.2 Fleet Management Solutions and Utilities
Module 3: Market Offerings
4.2 Choosing AV Software
Module 4: How to Protect Yourself
1.2 Importance of Endpoint Security
Module 1: Introduction
2.3 Attacks on PC's
Module 2: Threat Landscape
3.3 Hard Drive Encryption and Other Hardware Offerings
Module 3: Market Offerings
4.3 Defending Against the Modern Attacks
Module 4: How to Protect Yourself
2.4 Attacks on Printers/Multi-Function Printers (MFPs)
Module 2: Threat Landscape
3.4 Secure Browsing
Module 3: Market Offerings
4.4 Enforcing Policies
Module 4: How to Protect Yourself
2.5 Attacks on Mobile Devices
Module 2: Threat Landscape
3.5 Module 3 Recap
Module 3: Market Offerings
4.5 Do's and Don'ts
Module 4: How to Protect Yourself
Course Description
This course is about basics in Endpoint Security. In it, you will learn why endpoint security today is of such importance and basic terminology used in this field. Also, you will learn about threats that are existing today related to endpoints and what solutions and tools exist on the market that can help you defend from all kinds of attacks.
Prerequisites
In order to successfully understand everything talked about in this course, you will need the basic knowledge on how PCs and Printers are configured on the network, how users log onto domain and knowledge of IT Administrators and IT Security's role in a company.Course Goals
By the end of this course, students should be able to:Have a pretty good idea how to create ES architecture that will provide your company with high level of protection