Time
3 hours 35 minutes
Difficulty
Intermediate
CEU/CPE
4

Video Transcription

00:00
Hello and welcome to P C Security Intermediate Course.
00:04
In this course, you will be able to learn about reasons why the PC is the weakest link in corporate security today,
00:13
meaning what makes species so vulnerable from a technical standpoint and from organizational standpoint.
00:21
Then you will be able to learn how to protect hardware and the operating system of a PC,
00:28
and then how to prote protect programs and processes from outside intrusion and careless users. When I say the outside intrusion, I mean the malware that users can contract by visiting militias sites or by opening
00:48
e mails that contain malicious content.
00:52
So essentially discourse will be about securing your PC as a part off entire
01:02
I t infrastructure.
01:03
I will not be talking about some parts of from security that is concerning. PC is as a unit but is performed on server level or on a corporate level.
01:17
No, I'm just going to talk these about these things that are connected directly to the PC, the software installed on PC
01:23
and the way the PC eyes ah used and how to use it securely.
01:32
As for prerequisites for this course, you shouldn't even know some basics about PC architecture. Er, essentially, how PC works, although I will be going into detail about some things regarding the architecture of PC.
01:49
And also you should be able to know how the PCs managed on a on a company level not from perspective off organization, but from just a technical perspective. So what? What can be done to manage BC from
02:07
or fleet of PC's in a company?
02:10
Also, I suggest that you look at, um, Endpoint Security Intermediate course that I have done here in Cyber, which contains some things regarding the fleet management of the PC, if you're interested
02:25
and also to look at them Point Security Fundamentals course. Also here in Cyber A
02:31
that talks about some basic things about managing PC's and also goes into detail by these endpoint security today. So important.
02:44
As for me, my name is Milan Chatichai, my independent anti security consultant. I work here at CyberRays instructor, and that's for my credentials. I have some 25 years of executive experience in 90
02:59
out of that, I was in ah, mighty security for nine years. I was also 1980 journalists for nine years,
03:06
and in private life, I like movies like to cook. I, uh I'm quite knowledgeable about wines of the region where I live it.
03:15
If you have any questions regarding this course, I suggest you contact me
03:21
on my e mail that is written down on Did I just want to emphasize Please contact me about the organisational things that regards cyber. You should ask me just about the topics of the course if something is not clear or if you find something that you think is not right or something like that.
03:42
This course is meant for all I T professionals that want to learn more about the security of a PC,
03:51
but also to I t managers
03:53
Onda also I t security specialists who are not specialized in PC security.
04:00
And of course, there is, um, knowledge that can be useful in this course. For I t. Security and managers, I saw
04:08
because my experience is PC security is very low on the list off. Most people who take care of these things and also the most of them, think that just
04:21
installing anti malware software on the PC is enough to secure the PC. The rest will be done by the
04:28
great security concepts that are installed in the network, which is, unfortunately, not true.
04:35
So let's cut to the chase and this is the end of introduction. In next lesson, I'm going to talk about specifics off PC security.

Up Next

Intermediate PC Security

The Intermediate PC Security course will teach students about endpoint protection. Students will learn fundamental information about PC Security and common attack vectors.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor