01. Course Overview: 00:00:00 __ 1. Course Overview 02. Security Measures and Purposes: 00:01:28 __ 1. Physical Security Principles 00:04:42 __ 2. Surveillance and Alarms 00:08:56 __ 3. Ingress and Egress Security 00:16:16 __ 4. Physical Security for Staff 00:20:12 __ 5. Authentication 00:25:44 __ 6. Authorization 00:28:10 __ 7. Domain Security 00:36:48 __ 8. Communications Security 03. Wireless Protocols and Authentication: 00:41:30 __ 1. Wireless Protocols 00:48:23 __ 2. Wireless Authentication 04. Malware Prevention: 00:53:11 __ 1. Types of Malware 01:00:41 __ 2. Malware Symptoms 01:03:39 __ 3. Antimalware Tools 01:08:52 __ 4. Antimalware Techniques 05. Social Engineering Threats and Vulnerabilities: 01:14:54 __ 1. Social Engineering Attacks (1) 01:19:30 __ 2. Social Engineering Attacks (2) 01:25:05 __ 3. Security Threats 01:32:01 __ 4. Security Vulnerabilities 06. Security Settings in Windows: 01:36:29 __ 1. Users and Groups (Local) 01:42:09 __ 2. Users and Groups (Domain) 01:45:56 __ 3. Permissions 01:54:49 __ 4. Encryption (EFS) 01:58:25 __ 5. Encryption (BitLocker) 02:05:32 __ 6. Antivirus and Firewall 07. Workstation Security Best Practices: 02:11:45 __ 1. Platform Hardening 02:18:44 __ 2. Account Management 02:23:35 __ 3. Password Management 08. Mobile and Embedded Device Security: 02:28:50 __ 1. Physical Security 02:32:24 __ 2. Logical Security 02:35:54 __ 3. Special Considerations 09. Data Destruction and Disposal Methods: 02:43:52 __ 1. Recycling and Repurposing 02:49:21 __ 2. Physical Destruction 10. SOHO Network Security: 02:52:40 __ 1. Router and Firewall Settings 03:00:24 __ 2. Wi-fi Settings 11. Browser Security: 03:04:15 __ 1. Browser and Extension Installation 03:08:19 __ 2. Secure Connections 03:11:49 __ 3. Security Settings
Hide player controls
Hide resume playing