End-User Security: The End-User Perspective
Security
| Beginner
- 12 videos | 53m 19s
- Includes Assessment
- Earns a Badge
Learners can examine end-user security concepts such as shared responsibilities and policies, physical controls, authentication, software, and best practices in this 12-video course. You will begin with a look at shared responsibility, which has expanded greatly because of the use of cloud computing; this means that the role of the end user, the customer or client, in shared responsibility for security is expanding at an accelerated rate. Next, you will move on to defining acceptable use policies (AUP). You will discover how to distinguish physical security controls; classify authentication technologies, and recognize the importance of hardware and software updates. Following on from this, you will explore security suites and endpoint protection; learn about browser best practices, and define the security fundamentals of e-mail. You will also delve into the security issues surrounding personal cloud storage services, and protecting data at rest, or data storage security. To conclude the course, complete an exercise on describing the concepts and technologies of end-user security.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe shared responsibilityDefine acceptable use policiesDistinguish physical security controlsClassify authentication technologiesRecognize the importance of hardware and software updates
-
Describe security suites and endpoint protectionRecognize browser best practicesDefine e-mail security basicsDescribe cloud security issuesProtect data in storageDescribe concepts and technologies of end-user security
IN THIS COURSE
-
1m 35s
-
4m 50sUpon completion of this video, you will be able to describe the concept of shared responsibility. FREE ACCESS
-
5m 28sIn this video, you will learn how to define acceptable use policies. FREE ACCESS
-
2m 58sIn this video, find out how to distinguish between physical security controls. FREE ACCESS
-
6m 19sIn this video, you will classify authentication technologies. FREE ACCESS
-
2m 32sAfter completing this video, you will be able to recognize the importance of hardware and software updates. FREE ACCESS
-
7m 21sUpon completion of this video, you will be able to describe security suites and endpoint protection. FREE ACCESS
-
4m 20sAfter completing this video, you will be able to recognize best practices for using browsers. FREE ACCESS
-
7m 27sIn this video, you will learn how to define the basics of email security. FREE ACCESS
-
3m 35sUpon completion of this video, you will be able to describe security issues with clouds. FREE ACCESS
-
4m 54sLearn how to protect data while it is in storage. FREE ACCESS
-
2m 2sUpon completion of this video, you will be able to describe concepts and technologies related to end-user security. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.YOU MIGHT ALSO LIKE
Audiobook
Cybersecurity All-in-One For Dummies