Enterprise Security: Policies, Practices, and Procedures

The security market is changing rapidly, and these changes have made security management significantly more difficult. This course will teach you how to get ahead of the bad guys by looking at your infrastructure in a different light.
Course info
Level
Beginner
Updated
August 17, 2017
Duration
2h 38m
Table of contents
Description
Course info
Level
Beginner
Updated
August 17, 2017
Duration
2h 38m
Description

Most companies are "reactive" instead of "proactive" when it comes to securing their networks, resources, and data. In this course, Enterprise Security: Policies, Practices, and Procedures, you will learn how to get ahead of the bad guys by looking at your infrastructure in a different manner. First, you will get a better understanding of the landscape and how fast it is changing. Next, you will delve into industry standards, frameworks, policies, and how these can affect your environment. Finally, you will learn about what tools to use and the need for penetration testing. By the end of this course, you will know how to keep up with the changes and continue to maintain a high level of security in your environment.

About the author
About the author

Dale Meredith received his Certified Ethical Hacker and Certified EC-Counsel Instructor certifications back in 2006, as well as being a Microsoft Certified Trainer since 1998 (yes we had computers back then). Dale takes great pride in helping students comprehend and simplify complex IT concepts.

More from the author
More courses by Dale Meredith
Transcript
Transcript

Hi everyone, my name is Dale Meredith and welcome to my courseFundamentals of Enterprise Security: Policies, Practices and Procedures.

I‘ve been a trainer since 1998 specializing in Microsoft and Cyber Security. I hold several certifications.

This course is the starting off point for several certifications including GCIH, ECIH and CSA+. We’re gonna laydown some cornerstones to build upon for future courses in this series.

Some of the major topics that we will cover include:

  1. Making sure we understand the landscape and how fast it’s changing
  2. Some industry standards, frameworks and different types of policies and how they can affect our environment
  3. Some really cool tools that we can use
  4. And we’ll talk about the need for penetration testing.
By the end this course, you’ll know be able to look at your network and resources in a whole new light. You’ll start to be more proactive instead of being reactive to cybersecurity issues.

Before beginning the course you should be familiar with basic networking technologies like TCP/IP and devices like routers and switches.

From here, you should feel comfortable diving into the other courses within this series or even branch out a bit and look at the Ethical Hacking series

I hope you’ll join me on this adventure in learning, with the Fundamentals of Enterprise Security: Policies, Practices and Procedures course, at Pluralsight.