Manage and Control Recap

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

2 hours 27 minutes
Video Transcription
Welcome back to intermediate endpoint Security course. In this video, I'm going to do a recap off the section regarding management and control off endpoint devices. So in this module you have learned about the things that need to be managed and how to do it and why they need to be managed,
then how to plan your foot fleet. I spoke about the regular approach to Fleet Management and that you shouldn't have more than four devices in your product basket.
But then I also talked about bring your own device concept, which is really bad, and choose your own devices, which is a nicer way to call the
toe to name the product basket approach.
I spoke about least privilege concept. You have learned what the concept is, how to implement in there. What are the problems you will face while implementing it? What are the benefits and, of course, how to
go? I went to through through steps that you need to do during planning and implementation phase,
and in the end, I talked about how to manage processes which are not Richard. The physical processes that need people are checking things manually
in next Cem section. Next model, I'm be talking about protecting
Up Next
Intermediate Endpoint Security

In this course, students will learn the importance of endpoint security. The course will cover fundamentals of protecting hardware assets, operating systems, applications, and network devices.

Instructed By