The best perimeter defenses do little to thwart user actions relative to social engineering ploys, weak password selection, and social networking misuse. This places the security burden on a sound internal security environment consisting of network access control and endpoint security. In addition, organizations need a last line of defense against clever hackers who may slice their way through the perimeter. This intermediate training course, Endpoint Security and Network Access Control, is a must-have for any security, network, or IT professional who needs to protect sensitive data (e.g., employee information, payroll, healthcare records, and intellectual property) and internal assets from internal and external threats. Attendees will learn how to enforce security policies and access controls for key IT internal assets.
Enforce security policies to protect sensitive data from internal and external threats
Deploy Network Access Control to prevent malware contamination
Implement Data Loss Prevention (DLP) through host–based IDS/IPS and endpoint encryption
Regulate USB devices and optimize anti–malware
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.