SSCP 2021: Endpoint Protection & Mobile Device Management

SSCP    |    Intermediate
  • 8 videos | 33m 5s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 27 users Rating 4.6 of 27 users (27)
The first decade of the 21st century saw an explosion in the use of various mobile devices and cloud service providers in the enterprise. With this came a new challenge for security professionals from which several techniques and tools were developed. Get to grips with the many terms and activities related to endpoint protection and mobile device management in this vocational course. Explore what's involved in host-based intrusion prevention systems (HIPS) and host-based intrusion detection systems (HIDS). Examine endpoint encryption, protection, detection, and response. And study mobile provisioning and mobile device and application management. Upon course completion, you'll be familiar with the best techniques for protecting various devices and systems. You'll also be further prepared for the (ISC)² Systems Security Certified Practitioner (SSCP) 2021 exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe what personal firewalls as well as host-based intrusion detection systems (hids) and host-based intrusion prevention systems (hips) are used for
    Detail what's involved in application whitelisting, endpoint encryption, whole disk encryption, boot integrity, secure browsing and the purpose of self-encrypting drives, hardware root of trust, and seandroid
    Describe what endpoint detection and response (edr) tools are used for and the characteristics of next-generation endpoint protection, network access control and endpoint protection, and cloud-based edr
  • Compare mobile provisioning techniques, including cyod (choose your own device) and byod (bring your own device)
    Summarize activities, challenges, and solution requirements related to mobile device management (mdm) and enterprise mobility management (emm)
    Outline what's involved in mobile application management (mam)
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 39s
  • 3m 59s
  • Locked
    3.  Application Whitelisting and Endpoint Encryption
    6m 41s
  • Locked
    4.  What's Involved in Endpoint Detection and Response
    5m 5s
  • Locked
    5.  A Comparison of Mobile Provisioning Techniques
    4m 7s
  • Locked
    6.  What's Involved in Mobile Device Management (MDM)
    5m 41s
  • Locked
    7.  What's Involved in Mobile Application Management
    5m 10s
  • Locked
    8.  Course Summary
    43s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 64 users Rating 4.6 of 64 users (64)
Rating 4.5 of 12 users Rating 4.5 of 12 users (12)
Rating 4.7 of 9 users Rating 4.7 of 9 users (9)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 22 users Rating 4.5 of 22 users (22)
Rating 4.5 of 94 users Rating 4.5 of 94 users (94)
Rating 4.3 of 328 users Rating 4.3 of 328 users (328)