Time
2 hours 27 minutes
Difficulty
Intermediate
CEU/CPE
3

Video Transcription

00:00
Welcome back to intermediate endpoint Security course. In this video, I'm going to do a recap off the section regarding management and control off endpoint devices. So in this module you have learned about the things that need to be managed and how to do it and why they need to be managed,
00:19
then how to plan your foot fleet. I spoke about the regular approach to Fleet Management and that you shouldn't have more than four devices in your product basket.
00:31
But then I also talked about bring your own device concept, which is really bad, and choose your own devices, which is a nicer way to call the
00:41
toe to name the product basket approach.
00:45
I spoke about least privilege concept. You have learned what the concept is, how to implement in there. What are the problems you will face while implementing it? What are the benefits and, of course, how to
00:59
go? I went to through through steps that you need to do during planning and implementation phase,
01:06
and in the end, I talked about how to manage processes which are not Richard. The physical processes that need people are checking things manually
01:17
in next Cem section. Next model, I'm be talking about protecting

Up Next

Intermediate Endpoint Security

In this course, students will learn the importance of endpoint security. The course will cover fundamentals of protecting hardware assets, operating systems, applications, and network devices.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor