Cyber Security: Endpoint Defense
Course
Online
Description
-
Type
Course
-
Methodology
Online
-
Start date
Different dates available
Stop attacks where they begin!Computer and network security is very important and relevant in today's business world. Many system administrators and information technology professionals do not have formal training in computer security and may lack the budget to hire security professionals. They need an affordable solution to help them secure their data and improve their security posture.This video course will enable you to close the gap and be well acquainted with basic security fundamentals to improve their security. You will learn how to secure infrastructure, such as wireless access points, firewalls, and servers. Moving ahead, learn to secure applications and data by vulnerability scanning and patching, encryption, data loss prevention, and backups. Finally you will learn how to protect users from malware, phishing, and social engineering attacks and disaster recovery.By the end of the course, you will be a cyber security specialist capable of preventing data breaches and data loss, as these measures could save a company thousands of dollars. These topics are relevant to today's Information Technology environment and protection is vital to business success.About the AuthorGary Dewey is an IT consultant specializing in security. A graduate of SUNY Broome's Computer Security and Forensics degree program in New York, he has attended numerous B-Sides conferences and spoken at B-Sides in Rochester, New York. Gary participated in the 2015 US Cyber Challenge held at Virginia Tech. He is an active member of the Triple Cities Makerspace, a non-profit organization dedicated to community collaboration and learning. He enjoys hiking and cats. He is also the author of the video course: Ethical Hacking for Beginners.
Facilities
Location
Start date
Start date
About this course
Get familiar with the Security–in-layers principle
Configure firewalls, servers and wireless access points for security
Protect your data with encryption, data loss prevention, and backups
Secure applications by vulnerability assessment and patch management
Protect users with training in social engineering, phishing, and malware attacks
Master incident responses and disaster recovery plans/procedures
Reviews
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 4 years
Subjects
- Combat
- Wireless
- WiFi training
- Network Training
- IDS
- Engineering
- Technology
- IDS training
- Windows Server
- Network
- Server
- Linux
- Networks
- Windows
- Computer Security
Course programme
- Explore ways to improve Security Posture
- Take a look at the typical infrastructure
- Get to know more about the using Security in layers principle
- Explore network-based firewalls
- Explore host-based Firewalls
- Get to know more about IDS and IPS
- Learn the hardening of a Windows Server
- Learn the hardening of a Linux Server
- Explore the network strategy
- Get to know some tips for securing WiFi
- Take a look at a demo on unify setting
- Explore ways to improve Security Posture
- Take a look at the typical infrastructure
- Get to know more about the using Security in layers principle
- Explore network-based firewalls
- Explore host-based Firewalls
- Get to know more about IDS and IPS
- Learn the hardening of a Windows Server
- Learn the hardening of a Linux Server
- Explore the network strategy
- Get to know some tips for securing WiFi
- Take a look at a demo on unify setting
- Explore ways to improve Security Posture
- Take a look at the typical infrastructure
- Get to know more about the using Security in layers principle
- Explore ways to improve Security Posture
- Take a look at the typical infrastructure
- Get to know more about the using Security in layers principle
- Explore ways to improve Security Posture
- Take a look at the typical infrastructure
- Get to know more about the using Security in layers principle
- Explore ways to improve Security Posture
- Take a look at the typical infrastructure
- Get to know more about the using Security in layers principle
- Explore ways to improve Security Posture
- Take a look at the typical infrastructure
- Get to know more about the using Security in layers principle
- Explore ways to improve Security Posture
- Take a look at the typical infrastructure
- Get to know more about the using Security in layers principle
- Explore network-based firewalls
- Explore host-based Firewalls
- Get to know more about IDS and IPS
- Explore network-based firewalls
- Explore host-based Firewalls
- Get to know more about IDS and IPS
- Explore network-based firewalls
- Explore host-based Firewalls
- Get to know more about IDS and IPS
- Explore network-based firewalls
- Explore host-based Firewalls
- Get to know more about IDS and IPS
- Explore network-based firewalls
- Explore host-based Firewalls
- Get to know more about IDS and IPS
- Explore network-based firewalls
- Explore host-based Firewalls
- Get to know more about IDS and IPS
- Learn the hardening of a Windows Server
- Learn the hardening of a Linux Server
- Learn the hardening of a Windows Server
- Learn the hardening of a Linux Server
- Learn the hardening of a Windows Server
- Learn the hardening of a Linux Server
- Learn the hardening of a Windows Server
- Learn the hardening of a Linux Server
- Learn the hardening of a Windows Server
- Learn the hardening of a Linux Server
- Learn the hardening of a Windows Server
- Learn the hardening of a Linux Server
- Explore the network strategy
- Get to know some tips for securing WiFi
- Take a look at a demo on unify setting
- Explore the network strategy
- Get to know some tips for securing WiFi
- Take a look at a demo on unify setting
- Explore the network strategy
- Get to know some tips for securing WiFi
- Take a look at a demo on unify setting
- Explore the network strategy
- Get to know some tips for securing WiFi
- Take a look at a demo on unify setting
- Explore the network strategy
- Get to know some tips for securing WiFi
- Take a look at a demo on unify setting
- Explore the network strategy
- Get to know some tips for securing WiFi
- Take a look at a demo on unify setting
- Improve security posture with data classifications
- Dive deep into various types of data classifications
- Learn the need to classify data
- Get a deep understanding of encryption and the need to encrypt
- Go through a few examples of encryption technology
- Get a deep understanding of data loss prevention
- Go through a few examples of data loss prevention technology
- Learn more about Patch Management
- Study about application vulnerability assessment using OpenVAS
- Know the importance of backing up data
- Go through a few examples of backup technology
- Explore about Malware
- Know the various resources to combat malware
- Explore disaster recovery in detail
- Set Business Continuity plans
- Study the importance of SEA
- Explore the types of attacks
- Demonstrate an example on the Social Engineering Toolkit
- Study the importance of SEA
- Explore the types of attacks
- Demonstrate an example on the Social Engineering Toolkit
- Study the importance of SEA
- Explore the types of attacks
- Demonstrate an example on the Social Engineering Toolkit
- Study the importance of SEA
- Explore the types of attacks
- Demonstrate an example on the Social Engineering Toolkit
- Study the importance of SEA
- Explore the types of attacks
- Demonstrate an example on the Social Engineering Toolkit
- Study the importance of SEA
- Explore the types of attacks
- Demonstrate an example on the Social Engineering Toolkit
- Explore BYOD
- Set strategies
- Take a look at vSphere demo
- Explore BYOD
- Set strategies
- Take a look at vSphere demo
- Explore BYOD
- Set strategies
- Take a look at vSphere demo
- Explore BYOD
- Set strategies
- Take a look at vSphere demo
- Explore BYOD
- Set strategies
- Take a look at vSphere demo
- Explore BYOD
- Set strategies
- Take a look at vSphere demo
- Learn in detail the 6 phases according to SANS
- Explore the strategies for incident response
- Learn in detail the 6 phases according to SANS
- Explore the strategies for incident response
- Learn in detail the 6 phases according to SANS
- Explore the strategies for incident response
- Learn in detail the 6 phases according to SANS
- Explore the strategies for incident response
- Learn in detail the 6 phases according to SANS
- Explore the strategies for incident response
- Learn in detail the 6 phases according to SANS
- Explore the strategies for incident response
- Explore about Malware
- Know the various resources to combat malware
- Explore about Malware
- Know the various resources to combat malware
Additional information
Cyber Security: Endpoint Defense