Company: Pluralsight Author: Glenn Weadock Full Title: Computer Fundamentals: Security Year: 2019 Language: English Genre: Educational: Security Skill Level: Beginner Price: - - Files: MP4 (+ Slides .PDF) Time: 02:39:43 Video: AVC, 1280 x 720 (1.778) at 30.000 fps, 150 kbps Audio: AAC at 89 Kbps, 2 channels, 44.1 KHz Any aspiring computer technician must know how to implement security. From physical and logical security concepts to the details of secure protocols, malware protection, and authentication, this course discusses all aspects of computer security. Aspiring computer technicians must be able to implement security, one of the most important concerns of any IT organization. In this course, Computer Fundamentals: Security, youlll learn the fundamentals of all aspects of computer security. First, you’ll discover elements of physical security such as locks, badges, smartcards and hardware tokens. Then, you’ll learn about secure authentication, “least privilege” protection, permissions, and encryption, with a focus on wireless security and malware prevention, including social engineering attacks such as phishing. Finally, you'll see the laundry list of best practices for securing workstations, mobile devices, and SOHO routers. When you’re finished with this course, you'll be well prepared to implement strong security measures in your organization and prevent the most common security threats from damaging your organization’s systems, data, and people. Lessons: 1. Course Overview 01. Course Overview 2. Physical Security 02. Physical Security Principles 03. Visual Security 04. Ingress Security 05. Egress Security 06. Login Security (Physical) 3. Logical Security 07. Authentication 08. Authorization 09. Domain Security 10. Communications Security 4. Wireless Authentication and Encryption 11. Wireless Protocols 12. Wireless Authentication 5. Malware Prevention 13. Types of Malware 14. Malware Symptoms 15. Antimalware Tools 16. Antimalware Techniques 6. Social Engineering, Threats, and Vulnerabilities 17. Social Engineering Attacks 18. Security Threats 19. Security Vulnerabilities 7. Permissions and Encryption in Windows 20. Users and Groups 21. Permissions 22. Encryption 8. Securing Workstations: Best Practices 23. Platform Hardening 24. Account Management 25. Password Management 9. Securing Mobile Devices 26. Physical Security 27. Logical Security 28. Special Considerations 10. Decommissioning Storage Securely 29. Recycling and Repurposing 30. Physical Destruction 11. Securing SOHO Networks 31. Router and Firewall Settings 32. Wi-Fi Settings Our members see more. Join us! ------------- Our members see more. Join us!