Cyber Security: Endpoint Defense

Cyber Security: Endpoint Defense
Cyber Security: Endpoint Defense
English | MP4 | AVC 1920×1080 | AAC 48KHz 2ch | 1h 53m | 316 MB

Stop attacks where they begin!

Computer and network security is very important and relevant in today’s business world. Many system administrators and information technology professionals do not have formal training in computer security and may lack the budget to hire security professionals. They need an affordable solution to help them secure their data and improve their security posture.

This video course will enable you to close the gap and be well acquainted with basic security fundamentals to improve their security. You will learn how to secure infrastructure, such as wireless access points, firewalls, and servers. Moving ahead, learn to secure applications and data by vulnerability scanning and patching, encryption, data loss prevention, and backups. Finally you will learn how to protect users from malware, phishing, and social engineering attacks and disaster recovery.

By the end of the course, you will be a cyber security specialist capable of preventing data breaches and data loss, as these measures could save a company thousands of dollars. These topics are relevant to today’s Information Technology environment and protection is vital to business success.

A complete course packed with step-by-step instructions, working examples and helpful advice. This course is divided into sections to help focus security concepts in the following areas: infrastructure, applications and data, and users. This will help the user improve their overall security posture and focus their efforts for maximum impact.

What You Will Learn

  • Get familiar with the Security–in-layers principle
  • Configure firewalls, servers and wireless access points for security
  • Protect your data with encryption, data loss prevention, and backups
  • Secure applications by vulnerability assessment and patch management
  • Protect users with training in social engineering, phishing, and malware attacks
  • Master incident responses and disaster recovery plans/procedures
Table of Contents

Protecting Computer and Network Infrastructure
1 The Course Overview
2 Security Posture
3 Server Hardening
4 Securing Wireless Networks

Securing Applications and Data
5 Data Classification
6 Data Encryption
7 Data Loss Prevention
8 Application Vulnerability Assessment and Patching
9 Backing Up Data

Protecting Users
10 Social Engineering Attacks
11 BYOD – Bring Your Own Device
12 Incident Response
13 Malware
14 Disaster Recovery