Intermediate Endpoint Security

Course Content
Students will learn security concerns with BYOD, the concept of least privilege, and how to protect data.
Learners at 96% of Fortune 1000 companies trust Cybrary
Protecting Data from Theft
What do you Need to Manage Part 1
Introduction
Importance of Endpoint Security
Course Recap
Protecting Data from Destruction/Loss
What do you Need to Manage Part 2
Endpoint Devices Covered in this Course
Data Protection Recap
Fleet Planning, BYOD and CYOD
Goals of Endpoint Security
Least Privilege Approach
Protecting the Hardware of the PC Part 1
Process Management
Protecting the Hardware of the PC Part 2
Manage and Control Recap
Protecting Printing Devices
Protecting OS
Protecting Programs
Protecting Networks
Protecting Users
Goal of Endpoint Security Recap
Students will learn security concerns with BYOD, the concept of least privilege, and how to protect data.
Cybrary’s expert-led cybersecurity courses help your team remediate skill gaps and get up-to-date on certifications. Utilize Cybrary to stay ahead of emerging threats and provide team members with clarity on how to learn, grow, and advance their careers within your organization.
Learn core concepts and get hands-on with key skills.
Exercise your problem-solving and creative thinking skills with security-centric puzzles
Assess your knowledge and skills to identify areas for improvement and measure your growth
Put your skills to the test in virtual labs, challenges, and simulated environments.
Track your skills development from lesson to lesson using the Cybrary Skills Tracker.
Connect with peers and mentors through our supportive community of cybersecurity professionals.
Students will learn security concerns with BYOD, the concept of least privilege, and how to protect data.