End-User Security: The End-User Perspective

Security    |    Beginner
  • 12 Videos | 58m 19s
  • Includes Assessment
  • Earns a Badge
Likes 22 Likes 22
Learners can examine end-user security concepts such as shared responsibilities and policies, physical controls, authentication, software, and best practices in this 12-video course. You will begin with a look at shared responsibility, which has expanded greatly because of the use of cloud computing; this means that the role of the end user, the customer or client, in shared responsibility for security is expanding at an accelerated rate. Next, you will move on to defining acceptable use policies (AUP). You will discover how to distinguish physical security controls; classify authentication technologies, and recognize the importance of hardware and software updates. Following on from this, you will explore security suites and endpoint protection; learn about browser best practices, and define the security fundamentals of e-mail. You will also delve into the security issues surrounding personal cloud storage services, and protecting data at rest, or data storage security. To conclude the course, complete an exercise on describing the concepts and technologies of end-user security.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe shared responsibility
    define acceptable use policies
    distinguish physical security controls
    classify authentication technologies
    recognize the importance of hardware and software updates
  • describe security suites and endpoint protection
    recognize browser best practices
    define e-mail security basics
    describe cloud security issues
    protect data in storage
    describe concepts and technologies of end-user security

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 35s
    UP NEXT
  • Playable
    2. 
    Concepts of Shared Responsibility
    4m 50s
  • Locked
    3. 
    Acceptable Use Policies
    5m 28s
  • Locked
    4. 
    Physical Security Controls
    2m 58s
  • Locked
    5. 
    Authentication Technologies
    6m 19s
  • Locked
    6. 
    Software and Hardware Updates
    2m 32s
  • Locked
    7. 
    Personal Security Suites and Endpoint Protection
    7m 21s
  • Locked
    8. 
    Web Browser Best Practices
    4m 20s
  • Locked
    9. 
    E-mail Security Fundamentals
    7m 27s
  • Locked
    10. 
    Cloud Security Issues
    3m 35s
  • Locked
    11. 
    Protecting Data at Rest
    4m 54s
  • Locked
    12. 
    Exercise: End-User Security
    2m 2s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 1953 Likes 1953