Completed
Threat actors
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Ask the Experts - Unifying Endpoint Security Strategy for Enterprise
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Challenges with remote work
- 3 Managing endpoints
- 4 Gartner research
- 5 Direction of cyber security
- 6 Remote work
- 7 Cost of cyber attacks
- 8 Data breach
- 9 Unknown vulnerability
- 10 Overview
- 11 Known vulnerabilities
- 12 Unknown vulnerabilities
- 13 Data leak prevention
- 14 Application control
- 15 Unknown areas
- 16 Cyber Security Framework
- 17 Ransomware
- 18 What is ransomware
- 19 What is a cyberkill chain
- 20 Lockheed Martin cyberkill chain
- 21 Microsoft ransomware
- 22 Tools used in one attack
- 23 Threat actors
- 24 Better control
- 25 Unified endpoint management
- 26 Endpoint management strategy
- 27 Wrap up