5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Skills     Security     Security Accreditations and Best Practice     Systems Security Certified Practitioner 2021
The first decade of the 21st century saw an explosion in the use of various mobile devices and cloud service providers in the enterprise. With this came a new challenge for security professionals from which several techniques and tools were developed.
Get to grips with the many terms and activities related to endpoint protection and mobile device management in this vocational course. Explore what's involved in host-based intrusion prevention systems (HIPS) and host-based intrusion detection systems (HIDS). Examine endpoint encryption, protection, detection, and response. And study mobile provisioning and mobile device and application management.
Upon course completion, you'll be familiar with the best techniques for protecting various devices and systems. You'll also be further prepared for the (ISC)² Systems Security Certified Practitioner (SSCP) 2021 exam.

Objectives

SSCP 2021: Endpoint Protection and Mobile Device Management

  • discover the key concepts covered in this course
  • describe what personal firewalls as well as host-based intrusion detection systems (HIDS) and host-based intrusion prevention systems (HIPS) are used for
  • detail what's involved in application whitelisting, endpoint encryption, whole disk encryption, boot integrity, secure browsing and the purpose of self-encrypting drives, hardware root of trust, and SEAndroid
  • describe what endpoint detection and response (EDR) tools are used for and the characteristics of next-generation endpoint protection, Network Access Control and endpoint protection, and cloud-based EDR
  • compare mobile provisioning techniques, including CYOD (Choose Your Own Device) and BYOD (Bring Your Own Device)
  • summarize activities, challenges, and solution requirements related to mobile device management (MDM) and enterprise mobility management (EMM)
  • outline what's involved in mobile application management (MAM)
  • summarize the key concepts covered in this course