Free
Endpoint Security Fundamentals
This course is about basics in Endpoint Security. In it, you will learn why endpoint security today is of such importance and basic terminology used in this field. Also, you will learn about threats that are existing today related to endpoints and what solutions and tools exist on the market that can help you defend from all kinds of attacks.
2
H
10
M
Time
intermediate
difficulty
2
ceu/cpe
Course Content
5.1 Course Summary
Module 5: Course Summary
4.1 Talking to Management
Module 4: How to Protect Yourself
3.1 Antiviruses
Module 3: Market Offerings
2.1 Who/What are you up Against?
Module 2: Threat Landscape
1.0 Introduction
Module 1: Introduction
4.2 Choosing AV Software
Module 4: How to Protect Yourself
3.2 Fleet Management Solutions and Utilities
Module 3: Market Offerings
1.1 Technology
Module 1: Introduction
2.2 What do They Want?
Module 2: Threat Landscape
4.3 Defending Against the Modern Attacks
Module 4: How to Protect Yourself
3.3 Hard Drive Encryption and Other Hardware Offerings
Module 3: Market Offerings
1.2 Importance of Endpoint Security
Module 1: Introduction
2.3 Attacks on PC's
Module 2: Threat Landscape
4.4 Enforcing Policies
Module 4: How to Protect Yourself
3.4 Secure Browsing
Module 3: Market Offerings
2.4 Attacks on Printers/Multi-Function Printers (MFPs)
Module 2: Threat Landscape
4.5 Do's and Don'ts
Module 4: How to Protect Yourself
3.5 Module 3 Recap
Module 3: Market Offerings
2.5 Attacks on Mobile Devices
Module 2: Threat Landscape
Course Description
This course is about basics in Endpoint Security. In it, you will learn why endpoint security today is of such importance and basic terminology used in this field. Also, you will learn about threats that are existing today related to endpoints and what solutions and tools exist on the market that can help you defend from all kinds of attacks.
Prerequisites
In order to successfully understand everything talked about in this course, you will need the basic knowledge on how PCs and Printers are configured on the network, how users log onto domain and knowledge of IT Administrators and IT Security's role in a company.Course Goals
By the end of this course, students should be able to:Have a pretty good idea how to create ES architecture that will provide your company with high level of protection