Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.


Intermediate Endpoint Security

via Cybrary


Students will learn security concerns with BYOD, the concept of least privilege, and how to protect data.

Target Audience

People that will benefit the most from this course are:

  • IT professionals
  • IT managers
  • IT security specialists that want to add another specialization
  • IT Security Managers and ISOs


  • Basic PC Architecture
  • Knowledge of the vital importance of endpoint security (look for Endpoint Security Fundamentals course on Cybrary)
  • Basics of company level PC fleet management

Course Goals

By the end of this course, students should be able to know:

  • What are the goals of endpoint security?
  • How to structure Endpoint protection in your company?
  • How to manage your company’s PC fleet’s security?


  • Introduction
    • Introduction
  • Goal of Endpoint Security
    • Importance of Endpoint Security
    • Endpoint Devices Covered in this Course
    • Goals of Endpoint Security
    • Protecting the Hardware of the PC Part 1
    • Protecting the Hardware of the PC Part 2
    • Protecting Printing Devices
    • Protecting OS
    • Protecting Programs
    • Protecting Networks
    • Protecting Users
    • Goal of Endpoint Security Recap
  • Manage and Control
    • What do you Need to Manage Part 1
    • What do you Need to Manage Part 2
    • Fleet Planning, BYOD and CYOD
    • Least Privilege Approach
    • Process Management
    • Manage and Control Recap
  • Protecting Data
    • Protecting Data from Theft
    • Protecting Data from Destruction/Loss
    • Data Protection Recap
  • Conclusion
    • Course Recap

Taught by

Milan Cetic


Start your review of Intermediate Endpoint Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.