Coming mid-July
Cybrary Reimagined.
People first, Security first.
Coming mid-July.
Cybrary Reimagined.
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
People first, Security first.
Valid until October 31. Elevate your skills today!
Start for free
Free

Intermediate Endpoint Security

In this course, students will learn the importance of endpoint security. The course will cover fundamentals of protecting hardware assets, operating systems, applications, and network devices.
2
27
M
Time
intermediate
difficulty
3
ceu/cpe

Course Content

Course Recap

2m

Conclusion
Introduction

2m

Introduction
Importance of Endpoint Security

4m

Goal of Endpoint Security
Goals of Endpoint Security

8m

Goal of Endpoint Security
Least Privilege Approach

11m

Manage and Control
Process Management

7m

Manage and Control
Protecting Printing Devices

9m

Goal of Endpoint Security
Manage and Control Recap

1m

Manage and Control
Protecting OS

7m

Goal of Endpoint Security
Protecting Programs

6m

Goal of Endpoint Security
Protecting Networks

8m

Goal of Endpoint Security
Protecting Users

10m

Goal of Endpoint Security
Goal of Endpoint Security Recap

2m

Goal of Endpoint Security
Course Description

Students will learn security concerns with BYOD, the concept of least privilege, and how to protect data.

Target Audience

People that will benefit the most from this course are:

  • IT professionals
  • IT managers
  • IT security specialists that want to add another specialization
  • IT Security Managers and ISOs
  • Prerequisites

  • Basic PC Architecture
  • Knowledge of the vital importance of endpoint security (look for Endpoint Security Fundamentals course on Cybrary)
  • Basics of company level PC fleet management
  • Course Goals

    By the end of this course, students should be able to know:

  • What are the goals of endpoint security?
  • How to structure Endpoint protection in your company?
  • * How to manage your company’s PC fleet’s security?

    This course is part of a Career Path:
    No items found.

    Instructed by

    Instructor
    Milan Cetic

    I am seasoned IT professional with more than two decades of experience. I have been working as IT journalist, reviewing and testing hardware and software. I have worked as a pre-sales consultant for 15 years. I worked on small to very large projects in various industries and countries. At one point I was sole pre-sales contact for almost 20 countries and over 500 customers. I have been working in Hewlett Packard and HP Inc. as a specialist for printers and printing solutions as well as for PCs and PC solutions. I have substantial experience in solution selling. I also worked as an HP Supplies Trainer. I help customers and channel partners understand the benefits in using original supplies.

    I am known for finding ways to teach complex concepts and technological solutions for people that do not have an IT background. I am rather famous for my car metaphors, which I have chosen as something that almost everybody understands.

    After 15 years of working for a large company, I have decided to go independent and pursue my professional interests as independent consultant, with emphasis on security consulting.

    Provider
    Cybrary Logo
    Certification Body
    Certificate of Completion

    Complete this entire course to earn a Intermediate Endpoint Security Certificate of Completion