Time
2 hours 27 minutes
Difficulty
Intermediate
CEU/CPE
3

Video Transcription

00:00
Welcome back to intermediate endpoint Security Course in this lesson, I will do a recap off older learnings you had in this course.
00:11
So I have talked about what are the goals off endpoint security. So what you need to do when you're planning and the performing and point security.
00:23
Then I talked about protection off separate parts of endpoints hard were operating system programs, applications protecting network from infected PCs and how to protect users.
00:40
Then there was a section that was talking about designing, managing and controlling and points and security on those devices.
00:51
A za part of that. I have mentioned the least privilege, concept and wise. It's so good. And what are the some kind of guidelines to implement? Ah, pray least privilege concept. So I wasn't actually talking about the, uh,
01:10
practical things you need to do.
01:11
I talked more about things you need to plan. Oh, our plan to perform when planning to do less privilege. Because if you step on a stumble on each any of these steps, you have a problem and you cannot implement the least privilege concept.
01:29
Onda. The benefit would be that most of the problems that come with security and then points would be removed just by implementing this. And finally I talked about how to protect data. So I want to thank you
01:45
for listening to the scores I help you learned a lot on. I hope this will help you in your future career, so thank you and goodbye.

Intermediate Endpoint Security

In this course, students will learn the importance of endpoint security. The course will cover fundamentals of protecting hardware assets, operating systems, applications, and network devices.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor