Free
Intermediate Endpoint Security
In this course, students will learn the importance of endpoint security. The course will cover fundamentals of protecting hardware assets, operating systems, applications, and network devices.
2
H
27
M
Time
intermediate
difficulty
3
ceu/cpe
Course Content
Course Recap
Conclusion
Introduction
Introduction
Importance of Endpoint Security
Goal of Endpoint Security
What do you Need to Manage Part 1
Manage and Control
Protecting Data from Theft
Protecting Data
Endpoint Devices Covered in this Course
Goal of Endpoint Security
What do you Need to Manage Part 2
Manage and Control
Protecting Data from Destruction/Loss
Protecting Data
Goals of Endpoint Security
Goal of Endpoint Security
Fleet Planning, BYOD and CYOD
Manage and Control
Data Protection Recap
Protecting Data
Protecting the Hardware of the PC Part 1
Goal of Endpoint Security
Least Privilege Approach
Manage and Control
Protecting the Hardware of the PC Part 2
Goal of Endpoint Security
Process Management
Manage and Control
Protecting Printing Devices
Goal of Endpoint Security
Manage and Control Recap
Manage and Control
Protecting OS
Goal of Endpoint Security
Protecting Programs
Goal of Endpoint Security
Protecting Networks
Goal of Endpoint Security
Protecting Users
Goal of Endpoint Security
Goal of Endpoint Security Recap
Goal of Endpoint Security
Course Description
Students will learn security concerns with BYOD, the concept of least privilege, and how to protect data.