Time
2 hours 27 minutes
Difficulty
Intermediate
CEU/CPE
3

Video Transcription

00:00
welcome back to intermediate endpoint security course. And in this lesson, I'm going to talk about the importance of endpoint security. And why are the pieces and all books the most attack part of fighting system
00:16
so vital importance of endpoint security.
00:20
Ah,
00:21
is there I mean, the importance of endpoint security so vital because endpoint is now the weakest link in I t. Security in many companies.
00:32
Why?
00:34
Because people are protecting their networks, their routers, They have harder firewalls. They have servers with softer,
00:43
and they feel brother protected because they have built. It's like having a medieval fortress, and you build a big wall around it and you have people manning the wall and, uh, you feel safe. However, um, endpoint, meaning PCR printer
01:00
is highly one larible device
01:03
for many reasons.
01:06
One of the reasons is because it's handled and it's operated by people who have no knowledge or very little knowledge about security,
01:17
so they can be easily fooled to do things that will breach that security and very serious way.
01:23
Also,
01:26
the reason why endpoint security is so vital and important because it actually requires engagement of all employees in the company and over tickles.
01:36
It is not enough for I t. Security to define practices and things that have to be down and authority to implement it.
01:46
If, for example, nobody has trained the employees about things that they simply shouldn't do. For example, if somebody gives you in the years be you don't put it in your PC because that USB mind contained virus or malicious code.
02:02
Um, then the final reason is because people are not taking care of security or their own PC's. They think that that is a thing that they can leave to somebody else like I t security alrighty people, which they don't, by the way.
02:20
Then the hackers have found out that this is the weakest spots today in in a company, and they are using a lot off efforts to find a way to compromise endpoint and to make it a better ah, backdoor or to install some malicious software on it
02:39
and in that way, to attack a company. So,
02:45
um,
02:46
again, no matter how you secure your network, no books can get attacked when users take them home because somebody can compromise, for example, their Internet connection,
02:58
or they can get attacked during a business trip. Or they can get back during meetings with customers that their company
03:06
and phishing attacks. Tech Holding, please. And the fishing male gets true.
03:12
If you have a lot of people who have received that mail, you can make sure that somebody will click on billing
03:19
if nothing else, from the sheer curiosity. So some people if they had training, if they know that this is dangerous, they still do because they are
03:30
very curious or they just don't care.
03:32
So in this video, you have learned about wise and point security so important today and some challenges regarding security of PCs and printers and in next lesson, I'm going to talk about which endpoint devices are we going to cover in this course?

Up Next

Intermediate Endpoint Security

In this course, students will learn the importance of endpoint security. The course will cover fundamentals of protecting hardware assets, operating systems, applications, and network devices.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor