Intermediate Endpoint Security Course Summary
Establishing impenetrable security is by no means an easy task. Hence, several avenues for erroneous decisions are possible. According to HelpNetSecurity, about 68% of organizations were victims of endpoints attacks in 2019. This brings to light the failure to realize the potential vulnerabilities caused by overlooked entities such as endpoints. Milan Cetic, the course instructor, hopes to educate the importance of securing such endpoints in this course. Having some prerequisite knowledge on PC architecture and endpoint devices will help this course prove more effective for a learner, but by no means does it require you to have that knowledge. The course is available for anyone interested in security for endpoints, but is geared more towards IT security professionals and IT Managers.
The course consists of three main modules:
- Goals of Endpoint Security
- Manage and Control
- Protecting Data
Goals of Endpoint Security
This module introduces Endpoint Security, the several endpoint devices, and why securing these endpoints is such a big deal. Endpoint Security is discussed as an essential criterion to be taken into consideration while enforcing security. Several devices like laptops and printers are said to be endpoint devices that serve as leak points or vulnerable entry points. It also explains how a single endpoint compromise could lead to widespread damage across an entire organization. After a brief explanation on the goals of endpoint security involving the protection of endpoint devices, protection from network compromise through endpoint devices, protection of users and such, a dive into the protection methodologies for several entities such as hardware, printing devices, networks, OS and users strengthens the claims to secure endpoints. Hardware protection deals with the BIOS settings and ways to protect it, while the OS, programs, and users' lessons talk about ways to secure the respective entities.
Manage and Control
This module centers on how management brings about efficient endpoint security. It justifies the need for management, as a requirement for upholding policies, preventing unauthorized access, and handling changes. The hardware, OS Settings, software, and user passwords are all defined as those properties that require management, to ensure that the endpoint security measures are in place. An overview of Fleet Planning for businesses and companies and the security threats introduced by novel concepts such as the "Bring Your Own Device" (BYOD) and "Choose Your Own Device" (CYOD) are delivered. Finally, the Least Privilege Approach and Process management are also discussed in separate lessons to provide a better parallel to endpoint security.
This module introduces some of the ways to protect data from theft and destruction/loss. The first lesson explains methods to ensure the protection of data. It also deals with the types of data present based on its importance (such as sensitive, crucial, regular and redundant) and state (such as data at rest, data in motion, and data in use). Hence it deals with those types of data that must be protected based on the importance and state. It also briefs on the different data theft types such as physical and cyber, and ways to protect data from such thefts. The next section deals with the protection of data from destruction/loss by storing it in the cloud or making backups of the data.
The one enthralling idea of the course is to educate newbies, IT Managers, IT Pros, and anyone with an open mind to the often overlooked vulnerable entry point called Endpoints and the methods to identify, manage and secure such endpoints.