Intermediate Endpoint Security
In this course, students will learn the importance of endpoint security. The course will cover fundamentals of protecting hardware assets, operating systems, applications, and network devices.
Course Description
Students will learn security concerns with BYOD, the concept of least privilege, and how to protect data.
People that will benefit the most from this course are:
By the end of this course, students should be able to know:
Prerequisites
By the end of this course, students should be able to know:
What are the goals of endpoint security?
How to structure Endpoint protection in your company?
Module 1: Introduction
Module 2: Goal of Endpoint Security
Module 3: Manage and Control
Module 4: Protecting Data
Module 5: Conclusion
User Reviews
Be the first to review “Intermediate Endpoint Security”
You must be logged in to post a review.
×
There are no reviews yet.