In addition to malware protection, Lisa Bock reviews several best practices to provide email protection, including antispam, and defense against spoofing, phishing, and pharming.
- [Instructor] When it comes to email protection … both the client and server needs protection. … There are several best practices, … including anti-spam and defense against spoofing, … phishing, and pharming. … The reality is that Windows operating systems … have a 76% market share, … which makes it an attractive target for malware attacks. … I'm at this website where you can see the statistics … on the different operating systems. … And here tells you a little bit more detail … about the different versions of Windows, … including 10, 7, and down below here 8. … In most cases malware protection for email … is used to catch malware variants … before they even reach the inbox. … However the reality is that cyber criminals … are constantly improving their methods … to gain access into an organization. … Social engineering is the root of many cyberattacks, … which includes phishing, pharming, popups, … and fake websites. … Phishing and pharming are techniques that are used … to trick computer users into revealing personal …
- Define “passphrase.”
- Recall the purpose of multifactor authentication.
- Identify the tool used in today’s Windows operating systems to secure the file system.
- Explain what happens when a file is moved into a folder with permissions.
- Name the authentication protocol used in Active Directory.
- Recognize the location of the audit logs.
- Summarize the purpose of hardening.
- Explain the purpose of cryptographic techniques.
Skill Level Beginner
IT Security Foundations: Core Conceptswith Lisa Bock1h 35m Beginner
IT Security: Key Policies and Resourceswith Gregory Michaelidis23m 44s Intermediate
1. Understand User Authentication
2. Understand Permissions
3. Dissecting Audit Policies
4. Server Protection
5. Providing email protection
6. Understand Encryption
Next steps1m 3s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.