Free
Intermediate Endpoint Security
In this course, students will learn the importance of endpoint security. The course will cover fundamentals of protecting hardware assets, operating systems, applications, and network devices.

2
H
27
M
Time
intermediate
difficulty
3
ceu/cpe
Course Content
Data Protection Recap
Protecting Data
Protecting Data from Destruction/Loss
Protecting Data
Protecting Data from Theft
Protecting Data
Manage and Control Recap
Manage and Control
Process Management
Manage and Control
Least Privilege Approach
Manage and Control
Fleet Planning, BYOD and CYOD
Manage and Control
What do you Need to Manage Part 2
Manage and Control
What do you Need to Manage Part 1
Manage and Control
Goal of Endpoint Security Recap
Goal of Endpoint Security
Protecting Users
Goal of Endpoint Security
Protecting Networks
Goal of Endpoint Security
Protecting Programs
Goal of Endpoint Security
Protecting OS
Goal of Endpoint Security
Protecting Printing Devices
Goal of Endpoint Security
Protecting the Hardware of the PC Part 2
Goal of Endpoint Security
Protecting the Hardware of the PC Part 1
Goal of Endpoint Security
Goals of Endpoint Security
Goal of Endpoint Security
Endpoint Devices Covered in this Course
Goal of Endpoint Security
Importance of Endpoint Security
Goal of Endpoint Security
Introduction
Introduction
Course Recap
Conclusion
Course Description
Students will learn security concerns with BYOD, the concept of least privilege, and how to protect data.
## Target Audience
People that will benefit the most from this course are:
By the end of this course, students should be able to know: