Free

Endpoint Security Fundamentals

This course is about basics in Endpoint Security. In it, you will learn why endpoint security today is of such importance and basic terminology used in this field. Also, you will learn about threats that are existing today related to endpoints and what solutions and tools exist on the market that can help you defend from all kinds of attacks.
2
10
M
Time
intermediate
difficulty
2
ceu/cpe

Course Content

5.1 Course Summary

2m

Module 5: Course Summary
4.5 Do's and Don'ts

4m

Module 4: How to Protect Yourself
4.4 Enforcing Policies

5m

Module 4: How to Protect Yourself
4.3 Defending Against the Modern Attacks

6m

Module 4: How to Protect Yourself
4.2 Choosing AV Software

4m

Module 4: How to Protect Yourself
4.1 Talking to Management

8m

Module 4: How to Protect Yourself
3.5 Module 3 Recap

1m

Module 3: Market Offerings
3.4 Secure Browsing

7m

Module 3: Market Offerings
3.1 Antiviruses

8m

Module 3: Market Offerings
2.5 Attacks on Mobile Devices

4m

Module 2: Threat Landscape
2.3 Attacks on PC's

17m

Module 2: Threat Landscape
2.2 What do They Want?

5m

Module 2: Threat Landscape
2.1 Who/What are you up Against?

7m

Module 2: Threat Landscape
1.1 Technology

10m

Module 1: Introduction
1.0 Introduction

5m

Module 1: Introduction
Course Description

This course is about basics in Endpoint Security. In it, you will learn why endpoint security today is of such importance and basic terminology used in this field. Also, you will learn about threats that are existing today related to endpoints and what solutions and tools exist on the market that can help you defend from all kinds of attacks.

Prerequisites

In order to successfully understand everything talked about in this course, you will need the basic knowledge on how PCs and Printers are configured on the network, how users log onto domain and knowledge of IT Administrators and IT Security's role in a company.

Course Goals

By the end of this course, students should be able to:

  • Fully understand the importance of Endpoint security
  • Be able to talk about Endpoint Security with ease/use the correct vocabulary
  • Be fully aware of possible threats that exist today regarding attacks on PCs and printing devices
  • Have a pretty good idea how to create ES architecture that will provide your company with high level of protection

    This course is part of a Career Path:
    No items found.

    Instructed by

    Instructor
    Milan Cetic

    I am seasoned IT professional with more than two decades of experience. I have been working as IT journalist, reviewing and testing hardware and software. I have worked as a pre-sales consultant for 15 years. I worked on small to very large projects in various industries and countries. At one point I was sole pre-sales contact for almost 20 countries and over 500 customers. I have been working in Hewlett Packard and HP Inc. as a specialist for printers and printing solutions as well as for PCs and PC solutions. I have substantial experience in solution selling. I also worked as an HP Supplies Trainer. I help customers and channel partners understand the benefits in using original supplies.

    I am known for finding ways to teach complex concepts and technological solutions for people that do not have an IT background. I am rather famous for my car metaphors, which I have chosen as something that almost everybody understands.

    After 15 years of working for a large company, I have decided to go independent and pursue my professional interests as independent consultant, with emphasis on security consulting.

    Provider
    Cybrary Logo
    Certification Body
    Certificate of Completion

    Complete this entire course to earn a Endpoint Security Fundamentals Certificate of Completion