CISCO Networking Academy

Endpoint Security

Learn to secure your network all the way to the edge.

ACwAAAAAAQABAAACADs=

Achievements

Badges you can earn in this course.
 

Overview

Every day, billions of devices connect to networks, and each one requires protection. This course will help you build the skills needed to secure your network from the core to the edge, encompassing hardware, software, and media.

You will learn how to assess networks, operating systems, and endpoints for vulnerabilities and implement effective security measures. Additionally, you will acquire the skills necessary to ensure the integrity, confidentiality, and availability of your network and data.

Course Curriculum

Module 1: Cybersecurity Threats, Vulnerabilities, and Attacks

  • Introduction
  • Common Threats
  • Deception
  • Cyber Attacks
  • Wireless and Mobile Device Attacks
  • Application Attacks
  • Cybersecurity Threats, Vulnerabilities, and Attacks Summary

Module 2: Securing Networks

  • Introduction
  • Current State of Affairs
  • Who is Attacking Our Network?
  • Securing Networks Summary

Module 3: Attacking the Foundation

  • Introduction
  • IP PDU Details
  •  IP Vulnerabilities
  • TCP and UDP Vulnerabilities
  • Attacking the Foundation Summary

Module 4: Attacking What We Do

  • Introduction
  • IP Services
  • Enterprise Services
  • Mitigating Common Network Attacks
  • Attacking What We Do Summary

Module 5: Wireless Network Communication

  • Introduction
  • Wireless Communications
  • WLAN Threats
  • Secure WLANs
  • Wireless Network Communication Summary

Module 6: Network Security Infrastructure

  • Introduction
  • Security Devices
  • Security Services
  • Network Security Infrastructure Summary

Module 7: The Windows Operating System

  • Introduction
  • Windows History
  • Windows Architecture and Operations
  • Windows Configuration and Monitoring
  • Windows Security
  • The Windows Operating System Summary

Module 8: Linux Overview
Introduction

  • Linux Basics
  • Working in the Linux Shell
  • Linux Servers and Clients
  • Basic Server Administration
  • The Linux File System
  • Working with the Linux GUI
  • Working on a Linux Host
  • Linux Basics Summary

Module 9: System and Endpoint Protection

  • Introduction
  • Defending Systems and Devices
  • Antimalware Protection
  • Host-Based Intrusion Prevention
  • Application Security
  • System and Endpoint Protection Summary
Module 10: Cybersecurity Principles, Practices, and Processes
  • Introduction
  • The Three Dimensions
  • States of Data
  • Cybersecurity Countermeasures
  • Cybersecurity Principles, Practices, and Processes Summary