Free
Intermediate Endpoint Security
In this course, students will learn the importance of endpoint security. The course will cover fundamentals of protecting hardware assets, operating systems, applications, and network devices.
2
H
27
M
Time
intermediate
difficulty
3
ceu/cpe
Course Content
Protecting Data from Theft
Protecting Data
What do you Need to Manage Part 1
Manage and Control
Introduction
Introduction
Importance of Endpoint Security
Goal of Endpoint Security
Course Recap
Conclusion
Protecting Data from Destruction/Loss
Protecting Data
What do you Need to Manage Part 2
Manage and Control
Endpoint Devices Covered in this Course
Goal of Endpoint Security
Data Protection Recap
Protecting Data
Fleet Planning, BYOD and CYOD
Manage and Control
Goals of Endpoint Security
Goal of Endpoint Security
Least Privilege Approach
Manage and Control
Protecting the Hardware of the PC Part 1
Goal of Endpoint Security
Process Management
Manage and Control
Protecting the Hardware of the PC Part 2
Goal of Endpoint Security
Manage and Control Recap
Manage and Control
Protecting Printing Devices
Goal of Endpoint Security
Protecting OS
Goal of Endpoint Security
Protecting Programs
Goal of Endpoint Security
Protecting Networks
Goal of Endpoint Security
Protecting Users
Goal of Endpoint Security
Goal of Endpoint Security Recap
Goal of Endpoint Security
Course Description
Students will learn security concerns with BYOD, the concept of least privilege, and how to protect data.