The security market is changing rapidly, and these changes have made security management significantly more difficult. This course will teach you how to get ahead of the bad guys by looking at your infrastructure in a different light.
Most companies are "reactive" instead of "proactive" when it comes to securing their networks, resources, and data. In this course, Enterprise Security: Policies, Practices, and Procedures, you will learn how to get ahead of the bad guys by looking at your infrastructure in a different manner. First, you will get a better understanding of the landscape and how fast it is changing. Next, you will delve into industry standards, frameworks, policies, and how these can affect your environment. Finally, you will learn about what tools to use and the need for penetration testing. By the end of this course, you will know how to keep up with the changes and continue to maintain a high level of security in your environment.
Dale Meredith received his Certified Ethical Hacker and Certified EC-Counsel Instructor certifications back in 2006, as well as being a Microsoft Certified Trainer since 1998 (yes we had computers back then). Dale takes great pride in helping students comprehend and simplify complex IT concepts.
Course Overview Hey everyone. My name is Dale Meredith, and I'd like to welcome you to my course, The Fundamentals of Enterprise Security: Policies, Practices, and Procedures. Now I've been a trainer since 1998. I've specialized in Microsoft products, as well as cyber security. I have a plethora of certifications behind me. Let's just say, I kind of know what I'm talking about here. Now this course is a starting-off point for several different certifications including GCIH, ECIH, and CSA+. We're going to use this course to lay down some cornerstones to build upon in future courses within this series. Now some of the major topics that we'll talk about, first I'm going to make sure you have a good understanding of the landscape and how fast it's changing, we'll also look at some of the industry standards, their frameworks, and different types of policies, and how they can affect our environment. Of course, nothing is cool about security unless you can use some cool tools, and so we'll take a look at some of those. We'll also talk about the need for penetration testing. I'm not going to get into pen testing, but we're at least going to talk about why we need it. Now by the end of this course, you'll be able to look at your network and resource in a completely new light. You'll start to be more proactive, instead of reactive when it comes to cyber security issues. Before beginning this course, you need to make sure that you're somewhat familiar with basic networking technologies like TCP/IP and networking devices like routers and switches. I'm not going to get into any operating systems or actual commands yet, in future courses I definitely will. And then once you're done with this course, you should feel comfortable in diving into other courses within this series or even branching out a bit and look at the Ethical Hacking series. So I hope you'll join me, this is going to be an adventure in learning, and I'm going to try to make this fun and entertaining, I call it edutainment. So join me for Fundamentals in Enterprise Security: Policies, Practices, and Procedures, here at Pluralsight.