Cyber Security: Endpoint Defense

Course

Online

£ 20 + VAT

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Stop attacks where they begin!Computer and network security is very important and relevant in today's business world. Many system administrators and information technology professionals do not have formal training in computer security and may lack the budget to hire security professionals. They need an affordable solution to help them secure their data and improve their security posture.This video course will enable you to close the gap and be well acquainted with basic security fundamentals to improve their security. You will learn how to secure infrastructure, such as wireless access points, firewalls, and servers. Moving ahead, learn to secure applications and data by vulnerability scanning and patching, encryption, data loss prevention, and backups. Finally you will learn how to protect users from malware, phishing, and social engineering attacks and disaster recovery.By the end of the course, you will be a cyber security specialist capable of preventing data breaches and data loss, as these measures could save a company thousands of dollars. These topics are relevant to today's Information Technology environment and protection is vital to business success.About the AuthorGary Dewey is an IT consultant specializing in security. A graduate of SUNY Broome's Computer Security and Forensics degree program in New York, he has attended numerous B-Sides conferences and spoken at B-Sides in Rochester, New York. Gary participated in the 2015 US Cyber Challenge held at Virginia Tech. He is an active member of the Triple Cities Makerspace, a non-profit organization dedicated to community collaboration and learning. He enjoys hiking and cats. He is also the author of the video course: Ethical Hacking for Beginners.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Get familiar with the Security–in-layers principle
Configure firewalls, servers and wireless access points for security
Protect your data with encryption, data loss prevention, and backups
Secure applications by vulnerability assessment and patch management
Protect users with training in social engineering, phishing, and malware attacks
Master incident responses and disaster recovery plans/procedures

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 4 years

Subjects

  • Combat
  • Wireless
  • WiFi training
  • Network Training
  • IDS
  • Engineering
  • Technology
  • IDS training
  • Windows Server
  • Network
  • Server
  • Linux
  • Networks
  • Windows
  • Computer Security

Course programme

Protecting Computer and Network Infrastructure 5 lectures 39:46 The Course Overview This video will give you an overview about the course. Security Posture The aim of this video is to learn about Security Posture
  • Explore ways to improve Security Posture
  • Take a look at the typical infrastructure
  • Get to know more about the using Security in layers principle
Firewalls and IDS: Secure Your Network and Hosts The aim of this video is to learn about securing your network and hosts
  • Explore network-based firewalls
  • Explore host-based Firewalls
  • Get to know more about IDS and IPS
Server Hardening The aim of this video is to learn about Server Hardening
  • Learn the hardening of a Windows Server
  • Learn the hardening of a Linux Server
Securing Wireless Networks The aim of this video is to learn about securing wireless networks
  • Explore the network strategy
  • Get to know some tips for securing WiFi
  • Take a look at a demo on unify setting
Protecting Computer and Network Infrastructure 5 lectures 39:46 The Course Overview This video will give you an overview about the course. Security Posture The aim of this video is to learn about Security Posture
  • Explore ways to improve Security Posture
  • Take a look at the typical infrastructure
  • Get to know more about the using Security in layers principle
Firewalls and IDS: Secure Your Network and Hosts The aim of this video is to learn about securing your network and hosts
  • Explore network-based firewalls
  • Explore host-based Firewalls
  • Get to know more about IDS and IPS
Server Hardening The aim of this video is to learn about Server Hardening
  • Learn the hardening of a Windows Server
  • Learn the hardening of a Linux Server
Securing Wireless Networks The aim of this video is to learn about securing wireless networks
  • Explore the network strategy
  • Get to know some tips for securing WiFi
  • Take a look at a demo on unify setting
The Course Overview This video will give you an overview about the course. The Course Overview This video will give you an overview about the course. The Course Overview This video will give you an overview about the course. The Course Overview This video will give you an overview about the course. This video will give you an overview about the course. This video will give you an overview about the course. Security Posture The aim of this video is to learn about Security Posture
  • Explore ways to improve Security Posture
  • Take a look at the typical infrastructure
  • Get to know more about the using Security in layers principle
Security Posture The aim of this video is to learn about Security Posture
  • Explore ways to improve Security Posture
  • Take a look at the typical infrastructure
  • Get to know more about the using Security in layers principle
Security Posture The aim of this video is to learn about Security Posture
  • Explore ways to improve Security Posture
  • Take a look at the typical infrastructure
  • Get to know more about the using Security in layers principle
Security Posture The aim of this video is to learn about Security Posture
  • Explore ways to improve Security Posture
  • Take a look at the typical infrastructure
  • Get to know more about the using Security in layers principle
The aim of this video is to learn about Security Posture
  • Explore ways to improve Security Posture
  • Take a look at the typical infrastructure
  • Get to know more about the using Security in layers principle
The aim of this video is to learn about Security Posture
  • Explore ways to improve Security Posture
  • Take a look at the typical infrastructure
  • Get to know more about the using Security in layers principle
Firewalls and IDS: Secure Your Network and Hosts The aim of this video is to learn about securing your network and hosts
  • Explore network-based firewalls
  • Explore host-based Firewalls
  • Get to know more about IDS and IPS
Firewalls and IDS: Secure Your Network and Hosts The aim of this video is to learn about securing your network and hosts
  • Explore network-based firewalls
  • Explore host-based Firewalls
  • Get to know more about IDS and IPS
Firewalls and IDS: Secure Your Network and Hosts The aim of this video is to learn about securing your network and hosts
  • Explore network-based firewalls
  • Explore host-based Firewalls
  • Get to know more about IDS and IPS
Firewalls and IDS: Secure Your Network and Hosts The aim of this video is to learn about securing your network and hosts
  • Explore network-based firewalls
  • Explore host-based Firewalls
  • Get to know more about IDS and IPS
The aim of this video is to learn about securing your network and hosts
  • Explore network-based firewalls
  • Explore host-based Firewalls
  • Get to know more about IDS and IPS
The aim of this video is to learn about securing your network and hosts
  • Explore network-based firewalls
  • Explore host-based Firewalls
  • Get to know more about IDS and IPS
Server Hardening The aim of this video is to learn about Server Hardening
  • Learn the hardening of a Windows Server
  • Learn the hardening of a Linux Server
Server Hardening The aim of this video is to learn about Server Hardening
  • Learn the hardening of a Windows Server
  • Learn the hardening of a Linux Server
Server Hardening The aim of this video is to learn about Server Hardening
  • Learn the hardening of a Windows Server
  • Learn the hardening of a Linux Server
Server Hardening The aim of this video is to learn about Server Hardening
  • Learn the hardening of a Windows Server
  • Learn the hardening of a Linux Server
The aim of this video is to learn about Server Hardening
  • Learn the hardening of a Windows Server
  • Learn the hardening of a Linux Server
The aim of this video is to learn about Server Hardening
  • Learn the hardening of a Windows Server
  • Learn the hardening of a Linux Server
Securing Wireless Networks The aim of this video is to learn about securing wireless networks
  • Explore the network strategy
  • Get to know some tips for securing WiFi
  • Take a look at a demo on unify setting
Securing Wireless Networks The aim of this video is to learn about securing wireless networks
  • Explore the network strategy
  • Get to know some tips for securing WiFi
  • Take a look at a demo on unify setting
Securing Wireless Networks The aim of this video is to learn about securing wireless networks
  • Explore the network strategy
  • Get to know some tips for securing WiFi
  • Take a look at a demo on unify setting
Securing Wireless Networks The aim of this video is to learn about securing wireless networks
  • Explore the network strategy
  • Get to know some tips for securing WiFi
  • Take a look at a demo on unify setting
The aim of this video is to learn about securing wireless networks
  • Explore the network strategy
  • Get to know some tips for securing WiFi
  • Take a look at a demo on unify setting
The aim of this video is to learn about securing wireless networks
  • Explore the network strategy
  • Get to know some tips for securing WiFi
  • Take a look at a demo on unify setting
Securing Applications and Data 5 lectures 42:46 Data Classification The aim of this video is to learn more about classification of data
  • Improve security posture with data classifications
  • Dive deep into various types of data classifications
  • Learn the need to classify data
Data Encryption This video will give an in-depth knowledge on data encryption
  • Get a deep understanding of encryption and the need to encrypt
  • Go through a few examples of encryption technology
Data Loss Prevention The aim of this video to get a brief idea about prevention of data loss
  • Get a deep understanding of data loss prevention
  • Go through a few examples of data loss prevention technology
Application Vulnerability Assessment and Patching This video will teach you more about patching and vulnerability assessment
  • Learn more about Patch Management
  • Study about application vulnerability assessment using OpenVAS
Backing Up Data The aim of this video is to learn about backups
  • Know the importance of backing up data
  • Go through a few examples of backup technology
Securing Applications and Data 6 phases according to SANS
  • Explore the strategies for incident response
  • Malware The aim of this video is to get an understanding of Malware
    • Explore about Malware
    • Know the various resources to combat malware
    Disaster Recovery The aim of this video is to learn the ways of recovery when a disaster strikes
    • Explore disaster recovery in detail
    • Set Business Continuity plans
    Social Engineering Attacks This video will take you through the in-depth knowledge about Social Engineering Attacks
    • Study the importance of SEA
    • Explore the types of attacks
    • Demonstrate an example on the Social Engineering Toolkit
    Social Engineering Attacks This video will take you through the in-depth knowledge about Social Engineering Attacks
    • Study the importance of SEA
    • Explore the types of attacks
    • Demonstrate an example on the Social Engineering Toolkit
    Social Engineering Attacks This video will take you through the in-depth knowledge about Social Engineering Attacks
    • Study the importance of SEA
    • Explore the types of attacks
    • Demonstrate an example on the Social Engineering Toolkit
    Social Engineering Attacks This video will take you through the in-depth knowledge about Social Engineering Attacks
    • Study the importance of SEA
    • Explore the types of attacks
    • Demonstrate an example on the Social Engineering Toolkit
    This video will take you through the in-depth knowledge about Social Engineering Attacks
    • Study the importance of SEA
    • Explore the types of attacks
    • Demonstrate an example on the Social Engineering Toolkit
    This video will take you through the in-depth knowledge about Social Engineering Attacks
    • Study the importance of SEA
    • Explore the types of attacks
    • Demonstrate an example on the Social Engineering Toolkit
    BYOD - Bring Your Own Device With this video, get a hands-on experience in learning with BYOD
    • Explore BYOD
    • Set strategies
    • Take a look at vSphere demo
    BYOD - Bring Your Own Device With this video, get a hands-on experience in learning with BYOD
    • Explore BYOD
    • Set strategies
    • Take a look at vSphere demo
    BYOD - Bring Your Own Device With this video, get a hands-on experience in learning with BYOD
    • Explore BYOD
    • Set strategies
    • Take a look at vSphere demo
    BYOD - Bring Your Own Device With this video, get a hands-on experience in learning with BYOD
    • Explore BYOD
    • Set strategies
    • Take a look at vSphere demo
    With this video, get a hands-on experience in learning with BYOD
    • Explore BYOD
    • Set strategies
    • Take a look at vSphere demo
    With this video, get a hands-on experience in learning with BYOD
    • Explore BYOD
    • Set strategies
    • Take a look at vSphere demo
    Incident Response The aim of this video is to learn more about incident response
    • Learn in detail the 6 phases according to SANS
    • Explore the strategies for incident response
    Incident Response The aim of this video is to learn more about incident response
    • Learn in detail the 6 phases according to SANS
    • Explore the strategies for incident response
    Incident Response The aim of this video is to learn more about incident response
    • Learn in detail the 6 phases according to SANS
    • Explore the strategies for incident response
    Incident Response The aim of this video is to learn more about incident response
    • Learn in detail the 6 phases according to SANS
    • Explore the strategies for incident response
    The aim of this video is to learn more about incident response
    • Learn in detail the 6 phases according to SANS
    • Explore the strategies for incident response
    The aim of this video is to learn more about incident response
    • Learn in detail the 6 phases according to SANS
    • Explore the strategies for incident response
    Malware The aim of this video is to get an understanding of Malware
    • Explore about Malware
    • Know the various resources to combat malware
    Malware The aim of this video is to get an understanding of Malware
    • Explore about Malware
    • Know the various resources to combat malware
    Malware...

    Additional information

    Basic computer/network knowledge is required and some experience configuring computers and networks is desirable

    Cyber Security: Endpoint Defense

    £ 20 + VAT