Any aspiring computer technician must know how to implement security. From physical and logical security concepts to the details of secure protocols, malware protection, and authentication, this course discusses all aspects of computer security.
Aspiring computer technicians must be able to implement security, one of the most important concerns of any IT organization. In this course, Computer Fundamentals: Security, youlll learn the fundamentals of all aspects of computer security. First, you’ll discover elements of physical security such as locks, badges, smartcards and hardware tokens. Then, you’ll learn about secure authentication, “least privilege” protection, permissions, and encryption, with a focus on wireless security and malware prevention, including social engineering attacks such as phishing. Finally, you'll see the laundry list of best practices for securing workstations, mobile devices, and SOHO routers. When you’re finished with this course, you'll be well prepared to implement strong security measures in your organization and prevent the most common security threats from damaging your organization’s systems, data, and people.
Glenn is President of Independent Software Inc., a Denver IT consultancy. He has been teaching advanced computer seminars around the world since 1988. He developed official Server 2008 courseware for Microsoft. Glenn has written 18 commercial books for McGraw-Hill, Wiley, IDG and Sybex. He is also a sought-after expert witness.
Course Overview Hi everyone, my name is Glenn Weadock and welcome to my course Computer Fundamentals: Security. I'm a consultant and seminar leader at Independent Software, Inc in Colorado and an author of over a dozen books on Windows, networking, and certification. Any aspiring computer technicians must know how to implement security, one of the most important concerns of any IT organization. From physical and logical security concepts to the details of secure protocols, malware protection and authentication, this course discusses all aspects of computer security for computers, laptops, tablets, and phones. Some of the major topics that we will cover include protecting sensitive data with encryption, securing your mobile devices, preventing phishing attacks, choosing the best protocols and practices to secure wireless networks, and warding off viruses, worms, Trojans, and rootkits. By the end of this course, you'll know how to apply physical and logical security measures in any organization, set up anti-malware software and procedures, spot and correct security vulnerabilities, improve account security and password security according to the principle of least privilege, deploy security tokens and authenticator apps, configure SOHO routers and gateways, and perform secure disk formats. Now before beginning this course, you should be familiar with operating system basics, but no advanced knowledge is required. I hope you'll join me on this journey to learn about protecting your computers and networks with the Computer Fundamentals: Security course at Pluralsight.