IT Professional Fundamentals: Security
Any aspiring computer technician must know how to implement security. This course will teach you all aspects of computer security, from physical and logical security concepts to the details of secure protocols, malware protection, and authentication.
Aspiring computer technicians must be able to implement security, one of the most important concerns of any IT organization. In this course, IT Professional Fundamentals: Security, you’ll learn the fundamentals of all aspects of computer security. First, you’ll discover elements of physical security such as locks, badges, smartcards, and hardware tokens. Then, you’ll learn about secure authentication, “least privilege” protection, permissions, and encryption, with a focus on wireless security and malware prevention, including social engineering attacks such as phishing. Finally, you’ll see the laundry list of best practices for securing workstations, mobile devices, and SOHO routers. When you’re finished with this course, you’ll be well prepared to implement strong security measures in your organization and prevent the most common security threats from damaging your organization’s systems, data, and people.
Author Name: Glenn Weadock
Author Description:
Glenn E. Weadock (MDAA, MCAAA, MCT, MCSE, MCSA, MCITP, A+, Security+) is the president of Independent Software Inc., which he founded in 1982 after graduating from Stanford University’s engineering school. ISI provides expert witness, consulting, and training services in the IT field with a focus on operating systems and networking technologies. Glenn is the author of 18 commercial books on topics such as Windows clients and servers, Microsoft certification, website design, troubleshooting, and … more
Table of Contents
- Course Overview
1min - Security Measures and Purposes
40mins - Wireless Protocols and Authentication
11mins - Malware Prevention
21mins - Social Engineering Threats and Vulnerabilities
21mins - Security Settings in Windows
35mins - Workstation Security Best Practices
17mins - Mobile and Embedded Device Security
15mins - Data Destruction and Disposal Methods
8mins - SOHO Network Security
11mins - Browser Security
11mins
There are no reviews yet.