Free

Intermediate Printing Security

The Intermediate Printing Security course is intended for IT and cybersecurity professionals that want to learn how to secure print devices.
2
52
M
Time
intermediate
difficulty
3
ceu/cpe

Course Content

No items found.
Course Description

Students will learn the types of printing devices in use today, the differences between printers and MFPs, and attack vectors for printing devices. The course will also teach students general security best practices to help protect against print job, FW upgrade, and EWS hacking attacks.

Target Audience

  • People that will benefit the most from this course are:
  • IT professionals
  • IT managers
  • IT security specialists that want to add another specialization
  • IT Security Managers and ISOs
  • Prerequisites

  • Basics of network printing
  • Basics of network security
  • Basics of company level device management
  • Course Goals

    By the end of this course, students should be able to:

  • Know how the printing devices work and their impact on security.
  • How can a printing device be used for hacking?
  • * How to protect your printing devices?

    This course is part of a Career Path:
    No items found.

    Instructed by

    Instructor
    Milan Cetic

    I am seasoned IT professional with more than two decades of experience. I have been working as IT journalist, reviewing and testing hardware and software. I have worked as a pre-sales consultant for 15 years. I worked on small to very large projects in various industries and countries. At one point I was sole pre-sales contact for almost 20 countries and over 500 customers. I have been working in Hewlett Packard and HP Inc. as a specialist for printers and printing solutions as well as for PCs and PC solutions. I have substantial experience in solution selling. I also worked as an HP Supplies Trainer. I help customers and channel partners understand the benefits in using original supplies.

    I am known for finding ways to teach complex concepts and technological solutions for people that do not have an IT background. I am rather famous for my car metaphors, which I have chosen as something that almost everybody understands.

    After 15 years of working for a large company, I have decided to go independent and pursue my professional interests as independent consultant, with emphasis on security consulting.

    Provider
    Cybrary Logo
    Certification Body
    Certificate of Completion

    Complete this entire course to earn a Intermediate Printing Security Certificate of Completion