End-User Security: The Security Administrator Perspective
Security
| Beginner
- 9 videos | 39m 52s
- Includes Assessment
- Earns a Badge
In this 9-video course, learners will examine end-user security from the security administrator point-of-view including threatscape, security policies, training and awareness, Layer 2 security, 802.1x, MACsec, endpoint detection and response (EDR), advanced endpoint protection, and vendor solutions. Begin by taking a look at the present threatscape, while keeping in mind that it is constantly evolving, stealthy, and complex. You will examine written security policies, which every organization must have, and which apply to the entire organization. The policies must be well-written, comprehensive in scope, concise, easy to understand, and well organized. Next, you will explore training and awareness, which must be implemented for your end-users within the first few months of employment. You will compare access switch and wireless application protocol (WAP) security; describe 802.1x and MACsec; EDR protection, and next-generation EDR. In the closing exercise, you will be asked to list characteristics of next-generation EDR solutions, actions you can take with 802.1x port-based Network Access Control (PNAC), and the attributes of an effective security policy.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize the present threatscapeDescribe security policiesDefine training and awarenessCompare access switch and wap security
-
Describe 802.1x and macsecDescribe endpoint detection and responseDescribe next-generation edrList characteristics of next-generation edr solutions, actions you can take with 802.1x pnac, and attributes of an effective security policy
IN THIS COURSE
-
1m 28s
-
4m 4sUpon completion of this video, you will be able to recognize the current threat landscape. FREE ACCESS
-
7m 51sUpon completion of this video, you will be able to describe security policies. FREE ACCESS
-
4m 30sIn this video, you will learn how to define training and awareness. FREE ACCESS
-
9m 45sIn this video, find out how to compare the security of access switches and WAPs. FREE ACCESS
-
5m 25sUpon completion of this video, you will be able to describe 802.1x and MACsec. FREE ACCESS
-
2m 25sAfter completing this video, you will be able to describe Endpoint Detection and Response. FREE ACCESS
-
2m 45sUpon completion of this video, you will be able to describe next-generation endpoint detection and response. FREE ACCESS
-
1m 39sUpon completion of this video, you will be able to list characteristics of next-generation EDR solutions, actions you can take with 802.1X PNAC, and attributes of an effective security policy. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.