End-User Security: The Security Administrator Perspective

Security    |    Beginner
  • 9 videos | 39m 52s
  • Includes Assessment
  • Earns a Badge
Rating 4.1 of 49 users Rating 4.1 of 49 users (49)
In this 9-video course, learners will examine end-user security from the security administrator point-of-view including threatscape, security policies, training and awareness, Layer 2 security, 802.1x, MACsec, endpoint detection and response (EDR), advanced endpoint protection, and vendor solutions. Begin by taking a look at the present threatscape, while keeping in mind that it is constantly evolving, stealthy, and complex. You will examine written security policies, which every organization must have, and which apply to the entire organization. The policies must be well-written, comprehensive in scope, concise, easy to understand, and well organized. Next, you will explore training and awareness, which must be implemented for your end-users within the first few months of employment. You will compare access switch and wireless application protocol (WAP) security; describe 802.1x and MACsec; EDR protection, and next-generation EDR. In the closing exercise, you will be asked to list characteristics of next-generation EDR solutions, actions you can take with 802.1x port-based Network Access Control (PNAC), and the attributes of an effective security policy.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize the present threatscape
    Describe security policies
    Define training and awareness
    Compare access switch and wap security
  • Describe 802.1x and macsec
    Describe endpoint detection and response
    Describe next-generation edr
    List characteristics of next-generation edr solutions, actions you can take with 802.1x pnac, and attributes of an effective security policy

IN THIS COURSE

  • 1m 28s
  • 4m 4s
    Upon completion of this video, you will be able to recognize the current threat landscape. FREE ACCESS
  • Locked
    3.  Written Security Policies
    7m 51s
    Upon completion of this video, you will be able to describe security policies. FREE ACCESS
  • Locked
    4.  Security Training and Awareness
    4m 30s
    In this video, you will learn how to define training and awareness. FREE ACCESS
  • Locked
    5.  Access Switch and WAP Security
    9m 45s
    In this video, find out how to compare the security of access switches and WAPs. FREE ACCESS
  • Locked
    6.  802.1X and MACsec
    5m 25s
    Upon completion of this video, you will be able to describe 802.1x and MACsec. FREE ACCESS
  • Locked
    7.  Endpoint Detection and Response
    2m 25s
    After completing this video, you will be able to describe Endpoint Detection and Response. FREE ACCESS
  • Locked
    8.  Next-Generation Endpoint Protection
    2m 45s
    Upon completion of this video, you will be able to describe next-generation endpoint detection and response. FREE ACCESS
  • Locked
    9.  Exercise: End-User Security
    1m 39s
    Upon completion of this video, you will be able to list characteristics of next-generation EDR solutions, actions you can take with 802.1X PNAC, and attributes of an effective security policy. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 266 users Rating 4.7 of 266 users (266)
Rating 4.6 of 22 users Rating 4.6 of 22 users (22)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 94 users Rating 4.4 of 94 users (94)
Rating 4.3 of 120 users Rating 4.3 of 120 users (120)
Rating 4.6 of 223 users Rating 4.6 of 223 users (223)