3 hours 35 minutes
Hello and welcome to P C Security Intermediate Course.
In this course, you will be able to learn about reasons why the PC is the weakest link in corporate security today,
meaning what makes species so vulnerable from a technical standpoint and from organizational standpoint.
Then you will be able to learn how to protect hardware and the operating system of a PC,
and then how to prote protect programs and processes from outside intrusion and careless users. When I say the outside intrusion, I mean the malware that users can contract by visiting militias sites or by opening
e mails that contain malicious content.
So essentially discourse will be about securing your PC as a part off entire
I t infrastructure.
I will not be talking about some parts of from security that is concerning. PC is as a unit but is performed on server level or on a corporate level.
No, I'm just going to talk these about these things that are connected directly to the PC, the software installed on PC
and the way the PC eyes ah used and how to use it securely.
As for prerequisites for this course, you shouldn't even know some basics about PC architecture. Er, essentially, how PC works, although I will be going into detail about some things regarding the architecture of PC.
And also you should be able to know how the PCs managed on a on a company level not from perspective off organization, but from just a technical perspective. So what? What can be done to manage BC from
or fleet of PC's in a company?
Also, I suggest that you look at, um, Endpoint Security Intermediate course that I have done here in Cyber, which contains some things regarding the fleet management of the PC, if you're interested
and also to look at them Point Security Fundamentals course. Also here in Cyber A
that talks about some basic things about managing PC's and also goes into detail by these endpoint security today. So important.
As for me, my name is Milan Chatichai, my independent anti security consultant. I work here at CyberRays instructor, and that's for my credentials. I have some 25 years of executive experience in 90
out of that, I was in ah, mighty security for nine years. I was also 1980 journalists for nine years,
and in private life, I like movies like to cook. I, uh I'm quite knowledgeable about wines of the region where I live it.
If you have any questions regarding this course, I suggest you contact me
on my e mail that is written down on Did I just want to emphasize Please contact me about the organisational things that regards cyber. You should ask me just about the topics of the course if something is not clear or if you find something that you think is not right or something like that.
This course is meant for all I T professionals that want to learn more about the security of a PC,
but also to I t managers
Onda also I t security specialists who are not specialized in PC security.
And of course, there is, um, knowledge that can be useful in this course. For I t. Security and managers, I saw
because my experience is PC security is very low on the list off. Most people who take care of these things and also the most of them, think that just
installing anti malware software on the PC is enough to secure the PC. The rest will be done by the
great security concepts that are installed in the network, which is, unfortunately, not true.
So let's cut to the chase and this is the end of introduction. In next lesson, I'm going to talk about specifics off PC security.
Intermediate Endpoint Security
In this course, students will learn the importance of endpoint security. The course will ...
3 CEU/CPE Hours Available
Certificate of Completion Offered
Cloud computing test helps to gauge whether the candidate is skilled enough to work as ...