End-User Security: The End-User Perspective

Security    |    Beginner
  • 12 videos | 53m 19s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 120 users Rating 4.3 of 120 users (120)
Learners can examine end-user security concepts such as shared responsibilities and policies, physical controls, authentication, software, and best practices in this 12-video course. You will begin with a look at shared responsibility, which has expanded greatly because of the use of cloud computing; this means that the role of the end user, the customer or client, in shared responsibility for security is expanding at an accelerated rate. Next, you will move on to defining acceptable use policies (AUP). You will discover how to distinguish physical security controls; classify authentication technologies, and recognize the importance of hardware and software updates. Following on from this, you will explore security suites and endpoint protection; learn about browser best practices, and define the security fundamentals of e-mail. You will also delve into the security issues surrounding personal cloud storage services, and protecting data at rest, or data storage security. To conclude the course, complete an exercise on describing the concepts and technologies of end-user security.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe shared responsibility
    Define acceptable use policies
    Distinguish physical security controls
    Classify authentication technologies
    Recognize the importance of hardware and software updates
  • Describe security suites and endpoint protection
    Recognize browser best practices
    Define e-mail security basics
    Describe cloud security issues
    Protect data in storage
    Describe concepts and technologies of end-user security

IN THIS COURSE

  • 1m 35s
  • 4m 50s
    Upon completion of this video, you will be able to describe the concept of shared responsibility. FREE ACCESS
  • Locked
    3.  Acceptable Use Policies
    5m 28s
    In this video, you will learn how to define acceptable use policies. FREE ACCESS
  • Locked
    4.  Physical Security Controls
    2m 58s
    In this video, find out how to distinguish between physical security controls. FREE ACCESS
  • Locked
    5.  Authentication Technologies
    6m 19s
    In this video, you will classify authentication technologies. FREE ACCESS
  • Locked
    6.  Software and Hardware Updates
    2m 32s
    After completing this video, you will be able to recognize the importance of hardware and software updates. FREE ACCESS
  • Locked
    7.  Personal Security Suites and Endpoint Protection
    7m 21s
    Upon completion of this video, you will be able to describe security suites and endpoint protection. FREE ACCESS
  • Locked
    8.  Web Browser Best Practices
    4m 20s
    After completing this video, you will be able to recognize best practices for using browsers. FREE ACCESS
  • Locked
    9.  E-mail Security Fundamentals
    7m 27s
    In this video, you will learn how to define the basics of email security. FREE ACCESS
  • Locked
    10.  Cloud Security Issues
    3m 35s
    Upon completion of this video, you will be able to describe security issues with clouds. FREE ACCESS
  • Locked
    11.  Protecting Data at Rest
    4m 54s
    Learn how to protect data while it is in storage. FREE ACCESS
  • Locked
    12.  Exercise: End-User Security
    2m 2s
    Upon completion of this video, you will be able to describe concepts and technologies related to end-user security. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.3 of 23 users Rating 4.3 of 23 users (23)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 56 users Rating 4.6 of 56 users (56)
Rating 4.5 of 19 users Rating 4.5 of 19 users (19)
Rating 4.5 of 32 users Rating 4.5 of 32 users (32)