This is the fourth course in a series of eight courses designed to help you prepare for the ACA-Mac Integration exam. In this course, you'll look at the various built-in abilities that Mac OS X offers to help protect your Mac.
Even with advances in technology, security is still at the top of every company's minds. In this course, Securing and Protecting Macs, you'll learn how to protect your equipment and your sensitive data from the outside world. First, you'll learn how to protect your Mac from malware. Next, you'll delve into keeping your operating system and apps up to date to minimize vulnerabilities. Finally, you'll cover how to protect data from a remote user using a VPN. When you're finished with this course, you'll have the skills and knowledge needed to use the security features of OS X to secure and help prevent data loss within your environment.
Course Overview Hello, and welcome to Pluralsight. My name is Ken Mauldin, and welcome to my course on Securing and Protecting Macs. I'm a technical trainer at Fortinet, a network security company, and an author here at Pluralsight. This course is designed to help prepare you for taking the Apple Certified Associate Mac Integration exam, but it is also helpful for learning the different tools and methods that we can use to secure our Macs and help prevent data loss. In this course we're going to look at how to use different techniques to protect your Mac. Some of the major topics that we will cover include how to protect our Macs during the login process by disabling the automatic login, and requiring a password to be successfully authenticated. We'll also look at how you can protect yourself from malware by being able to install anti-virus software and XProtect. We'll look at how you can track your Mac if it's ever lost or stolen, and how to keep our operating system and apps up-to-date to help minimize the vulnerabilities that might exist. Finally, we'll look at how you can protect your data if it's going across the internet from a remote user to your corporate office using a VPN. By the end of this course you will be able to not only discuss the different ways you can use the security features of OS X and Mac OS, but you will also be able to show someone the proper tools to use for each task. Before beginning this course you should be familiar with OS X basics and how to navigate through Finder and the System Preferences. A basic knowledge of system and network security is recommended, but is not a requirement. I hope you'll join me on this journey to learn how important Mac security is with Securing and Protecting Macs course here at Pluralsight.