Curriculum
Course: Comprehensive Cybersecurity Training
Login

Curriculum

Comprehensive Cybersecurity Training

Module 2: Evaluate Network Security Capabilities, Secure Communication and Assess Endpoints security capabilities

0/33

Module 3: Implement Identity and Access Management and Cryptography & Secure Solution Implementation

0/47

Module 4: Threats, Vulnerabilities, Risk & Social Engineering, Explain Vulnerability Management and Analyze indicators of Malicious activities

0/47

Module 5: Secure Cloud Network Architecture, Explain Resiliency and Site Security Concepts

0/35

Module 6: Governance, Risk and Compliance

0/56
Text lesson

Week 5.0 Assess Endpoint Security Capabilities

Overview

This module explores how organizations secure laptops, desktops, mobile devices, and other endpoints that directly interact with sensitive data. Since endpoints are common targets for attackers, students learn how to strengthen and protect them using proven security techniques, modern tools, and safe configuration practices.

The module begins with Endpoint Hardening, which focuses on reducing vulnerabilities by disabling unnecessary services, applying security patches, enforcing strong authentication, and setting strict access controls. Students also study Endpoint Protection—solutions like antivirus, anti-malware, Disk Encryption and Patch Management. Building on this, the course covers Advanced Endpoint Protection, including AI-driven detection, Endpoint Detection and Response (EDR), and real-time threat hunting, which provide deeper visibility and rapid incident response.

Learners then explore Endpoint Configuration, which emphasizes setting up endpoints in secure and consistent ways across an organization. This includes applying configuration policies, using baseline templates, enforcing updates, and managing applications to ensure every device starts from a hardened and trusted state.

The module also dives into Hardening Techniques such as secure boot, patch management, privilege control, application whitelisting, and disk encryption. Students learn how these techniques reduce the attack surface and prevent unauthorized access. Special focus is placed on Hardening Specialized Devices, such as servers, IoT equipment, and industrial controllers, which often require unique security controls due to their specific roles and operating environments.

Mobile security is another critical element. The course introduces Mobile Hardening Techniques, teaching learners how to secure smartphones and tablets by using strong passcodes, limiting app permissions, enabling automatic updates, and enforcing enterprise mobile management policies. Students examine Full Device Encryption and External Media Protection, ensuring that even if a device or USB drive is lost or stolen, data remains unreadable without the correct key.

The module extends into mobile connectivity. Location Services are explained in the context of privacy and security, showing how they can be controlled to prevent unnecessary data exposure. Learners examine Cellular and GPS Connection Methods, understanding how mobile networks operate and the potential risks of untrusted base stations or GPS spoofing. Wi-Fi and Tethering Connection Methods are covered in detail, highlighting how mobile devices connect to networks and the common threats associated with public Wi-Fi or unsecured hotspots.

Further, the course discusses Bluetooth Connection Methods, focusing on preventing attacks such as bluejacking, bluesnarfing, and unauthorized pairing. Learners also explore Near-Field Communication (NFC) and Mobile Payment Services, understanding how contactless communication works, how mobile wallets and payment apps secure transactions, and the best practices users should follow to avoid fraud or unauthorized access.

By the end of this module, learners gain a solid understanding of how to protect endpoints from modern threats, secure mobile communication channels, configure devices safely, and defend sensitive organizational data across laptops, desktops, phones, and specialized systems. Anyone working in cybersecurity, IT support, or secure system administration needs these skills.