Stop attacks where they begin!
About This Video
- Explore affordable training solutions for IT professionals and system administrators in computer security
- Master security principles and configurations to improve a site's overall security posture
- Learn topics relevant to today's Information Technology landscape and environments
Computer and network security is very important and relevant in today's business world. Many system administrators and information technology professionals do not have formal training in computer security and may lack the budget to hire security professionals. They need an affordable solution to help them secure their data and improve their security posture.
This video course will enable you to close the gap and be well acquainted with basic security fundamentals to improve their security. You will learn how to secure infrastructure, such as wireless access points, firewalls, and servers. Moving ahead, learn to secure applications and data by vulnerability scanning and patching, encryption, data loss prevention, and backups. Finally you will learn how to protect users from malware, phishing, and social engineering attacks and disaster recovery.
By the end of the course, you will be a cyber security specialist capable of preventing data breaches and data loss, as these measures could save a company thousands of dollars. These topics are relevant to today's Information Technology environment and protection is vital to business success.
This course is intended for system administrators and Information Technology staff who haven't had any training in computer/network security and who may lack the budget to hire security professionals. Basic computer/network knowledge is required and some experience configuring computers and networks is desirable. The user will learn techniques for securing their computers, networks, and data. They will learn how to improve their overall security posture.
Table of contents
- Chapter 1 : Protecting Computer and Network Infrastructure
- Chapter 2 : Securing Applications and Data
- Chapter 3 : Protecting Users
- Title: Cyber Security: Endpoint Defense
- Release date: May 2018
- Publisher(s): Packt Publishing
- ISBN: 9781788990981
You might also like
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …
Hands-On pfSense 2.x for Firewalls and Routers
Elite network security with open source software! About This Video Install and navigate pfSense and become …
The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling
More than 25 Hours of Expert Video Instruction This course is a complete guide to help …
The Complete Ethical Hacking Course
Protect yourself from hackers and cyber attacks. Master penetration testing + build security and coding tools …