Cyber Security: Endpoint Defense

امنیت کامپیوتر هاو شبکه ها در دنیای کسب و کار امروز بسیار مهم است. بسیاری از مدیران و متخصصان فناوری اطلاعات آموزش های رسمی و لازم در زمینه امنیت ها ندارند و سازمان ها و شرکت ها ممکن است برای استخدام متخصصان امنیتی از افراد خبره در این زمینه استفاده نکنند. این دوره آموزشی شما را قادر می سازد با اصول پایه امنیتی برای بهبود امنیت، آشنا شوید. همچنین شما با نحوه محافظت از زیرساخت ها، مانند نقاط دسترسی بی سیم، فایروال ها و سرورها را خواهید آموخت،  یادگیری برای محافظت از برنامه ها و اطلاعات توسط اسکن آسیب پذیری، رمزگذاری، جلوگیری از از دست دادن اطلاعات و پشتیبان گیری. در نهایت شما نحوه محافظت از کاربران در برابر نرم افزارهای مخرب، فیشینگ و مهندسی اجتماعی و بازیابی فاجعه را یاد خواهید گرفت.

لینک دانلود ویدئو آموزشی Cyber Security: Endpoint Defense

دانلود – حجم : 273 مگابايت

رمز فايل:

Video Details
ISBN 139781788990981
Gary Dewey
Wednesday, May 16, 2018
Packt Publishing
Course Length1 hour and 53 minutes

Video Description
Computer and network security is very important and relevant in today’s business world. Many system administrators and information technology professionals do not have formal training in computer security and may lack the budget to hire security professionals. They need an affordable solution to help them secure their data and improve their Cyber Security posture.

This video course will enable you to close the gap and be well acquainted with basic security fundamentals to improve their security. You will learn how to secure infrastructure, such as wireless access points, firewalls, and servers. Moving ahead, learn to secure applications and data by vulnerability scanning and patching, encryption, data loss prevention, and backups. Finally you will learn how to protect users from malware, phishing, and social engineering attacks and disaster recovery.

By the end of the course, you will be a cyber security specialist capable of preventing data breaches and data loss, as these measures could save a company thousands of dollars. These topics are relevant to today’s Information Technology environment and protection is vital to business success.

Style and Approach
A complete course packed with step-by-step instructions, working examples and helpful advice. This course is divided into sections to help focus security concepts in the following areas: infrastructure, applications and data, and users. This will help the user improve their overall security posture and focus their efforts for maximum impact.
Table of Contents
Protecting Computer and Network Infrastructure
Securing Applications and Data
Protecting Users

What You Will Learn
Get familiar with the Security–in-layers principle Cyber Security
Configure firewalls, servers and wireless access points for security
Protect your data with encryption, data loss prevention, and backups
Secure applications by vulnerability assessment and patch management
Protect users with training in social engineering, phishing, and malware attacks
Master incident responses and disaster recovery plans/procedures

  • Design

آدرس ایمیل شما منتشر نخواهد شد.