PLU | Computer Fundamentals: Security (2019 EN)

Discussion in 'Information Technology' started by Kanka, Jul 27, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,037
    Likes Received:
    449
    Trophy Points:
    83
    [​IMG]

    Company: Pluralsight
    Author: Glenn Weadock
    Full Title: Computer Fundamentals: Security
    Year: 2019
    Language: English
    Genre: Educational: Security
    Skill Level: Beginner
    Price: -
    -
    Files: MP4 (+ Slides .PDF)
    Time: 02:39:43
    Video: AVC, 1280 x 720 (1.778) at 30.000 fps, 150 kbps
    Audio: AAC at 89 Kbps, 2 channels, 44.1 KHz



    Any aspiring computer technician must know how to implement security. From physical and logical security concepts to the details of secure protocols, malware protection, and authentication, this course discusses all aspects of computer security.

    Aspiring computer technicians must be able to implement security, one of the most important concerns of any IT organization. In this course, Computer Fundamentals: Security, youlll learn the fundamentals of all aspects of computer security. First, you’ll discover elements of physical security such as locks, badges, smartcards and hardware tokens. Then, you’ll learn about secure authentication, “least privilege” protection, permissions, and encryption, with a focus on wireless security and malware prevention, including social engineering attacks such as phishing. Finally, you'll see the laundry list of best practices for securing workstations, mobile devices, and SOHO routers. When you’re finished with this course, you'll be well prepared to implement strong security measures in your organization and prevent the most common security threats from damaging your organization’s systems, data, and people.


    Lessons:
    1. Course Overview
    01. Course Overview
    2. Physical Security
    02. Physical Security Principles
    03. Visual Security
    04. Ingress Security
    05. Egress Security
    06. Login Security (Physical)
    3. Logical Security
    07. Authentication
    08. Authorization
    09. Domain Security
    10. Communications Security
    4. Wireless Authentication and Encryption
    11. Wireless Protocols
    12. Wireless Authentication
    5. Malware Prevention
    13. Types of Malware
    14. Malware Symptoms
    15. Antimalware Tools
    16. Antimalware Techniques
    6. Social Engineering, Threats, and Vulnerabilities
    17. Social Engineering Attacks
    18. Security Threats
    19. Security Vulnerabilities
    7. Permissions and Encryption in Windows
    20. Users and Groups
    21. Permissions
    22. Encryption
    8. Securing Workstations: Best Practices
    23. Platform Hardening
    24. Account Management
    25. Password Management
    9. Securing Mobile Devices
    26. Physical Security
    27. Logical Security
    28. Special Considerations
    10. Decommissioning Storage Securely
    29. Recycling and Repurposing
    30. Physical Destruction
    11. Securing SOHO Networks
    31. Router and Firewall Settings
    32. Wi-Fi Settings


    -------------