Internet And Network Technologies
End-user Security Awareness
End-User Security: Securing End Users against Attackers
End-User Security: The End-User Perspective
End-User Security: The Security Administrator Perspective
Final Exam: Forensics Analyst

End-User Security: Securing End Users against Attackers

Course Number:
it_saeusadj_03_enus
Lesson Objectives

End-User Security: Securing End Users against Attackers

  • discover the key concepts covered in this course
  • describe attack motivation
  • define malware-as-a-service
  • compare phishing techniques
  • describe ransomware
  • describe data breaches and theft
  • define cryptojacking
  • describe DoS and DDoS attacks
  • compare common exploit kits
  • list common motives for attacking endpoints, common ransomware payloads, and exploit kits

Overview/Description

Examine end-user security from the rogue attacker point-of-view including motivations, MaaS, phishing techniques, ransomware, data theft, cryptojacking, DoS, and toolkits.



Target

Prerequisites: none

End-User Security: The End-User Perspective

Course Number:
it_saeusadj_01_enus
Lesson Objectives

End-User Security: The End-User Perspective

  • discover the key concepts covered in this course
  • describe shared responsibility
  • define acceptable use policies
  • distinguish physical security controls
  • classify authentication technologies
  • recognize the importance of hardware and software updates
  • describe security suites and endpoint protection
  • recognize browser best practices
  • define e-mail security basics
  • describe cloud security issues
  • protect data in storage
  • describe concepts and technologies of end-user security

Overview/Description

Examine end-user security concepts such as shared responsibilities and policies, physical controls, authentication, software, and best practices.



Target

Prerequisites: none

End-User Security: The Security Administrator Perspective

Course Number:
it_saeusadj_02_enus
Lesson Objectives

End-User Security: The Security Administrator Perspective

  • discover the key concepts covered in this course
  • recognize the present threatscape
  • describe security policies
  • define training and awareness
  • compare access switch and WAP security
  • describe 802.1x and MACsec
  • describe Endpoint Detection and Response
  • describe next-generation EDR
  • list characteristics of next-generation EDR solutions, actions you can take with 802.1X PNAC, and attributes of an effective security policy

Overview/Description

Examine end-user security from the security administrator point-of-view including threatscape, security policies, training and awareness, Layer 2 security, 802.1X, MACsec, EDR, advanced endpoint protection, and vendor solutions.



Target

Prerequisites: none

Final Exam: Forensics Analyst

Course Number:
dj_sasa2_a01_fe_enus
Objectives:

Overview/Description
Final Exam: Forensics Analyst will test your knowledge and application of the topics presented throughout the Forensics Analyst track of the Skillsoft Aspire Security Analyst to Security Architect Journey.

Target Audience
Learners seeking to test their knowledge and application of Forensics Analyst skills and those seeking to complete the Forensics Analyst track of the Skillsoft Aspire Security Analyst to Security Architect Journey.

Prerequisites: none

Close Chat Live