WEBVTT 0:00:07.720000 --> 0:00:13.300000 Hello and welcome to this course from INE titled Content and Endpoint 0:00:13.300000 --> 0:00:19.100000 Security. My name is Keith Bogart and I will be your instructor for the 0:00:19.100000 --> 0:00:21.420000 duration of the videos in this course. 0:00:21.420000 --> 0:00:26.960000 As you can see here, I'm providing to you my email address, my Twitter 0:00:26.960000 --> 0:00:29.020000 and my LinkedIn information. 0:00:29.020000 --> 0:00:32.660000 So, after watching or during the watching of these videos, if you have 0:00:32.660000 --> 0:00:35.500000 any questions, if there's anything in these videos that don't make any 0:00:35.500000 --> 0:00:38.860000 sense or anything like that, feel free to reach out to me and I'll do 0:00:38.860000 --> 0:00:42.980000 the best I possibly can to assist you with your question. 0:00:42.980000 --> 0:00:45.220000 I am a staff instructor here at INE. 0:00:45.220000 --> 0:00:49.340000 I specialize in the routing and switching categories as well as CCNA security 0:00:49.340000 --> 0:00:52.020000 and this course falls squarely within that. 0:00:52.020000 --> 0:00:56.760000 So, if you are preparing for your Cisco CCNA security exam, this fits 0:00:56.760000 --> 0:00:59.920000 squarely into one of the bullet points, one of the major bullet points 0:00:59.920000 --> 0:01:04.660000 in the topic or blueprint for that exam. 0:01:04.660000 --> 0:01:08.540000 So, I've broken up this course into three general headings and there will 0:01:08.540000 --> 0:01:11.140000 be several videos underneath each category. 0:01:11.140000 --> 0:01:14.460000 I'm going to be talking about describing mitigation technologies for email 0:01:14.460000 --> 0:01:17.740000 -based threats. So, I'm going to introduce you to something called the 0:01:17.740000 --> 0:01:22.640000 Cisco email security appliance and we'll talk about how that can be utilized 0:01:22.640000 --> 0:01:28.220000 within a network to prevent emails from being used as an attack vector, 0:01:28.220000 --> 0:01:32.060000 to prevent emails from coming to you that contain malware or malicious 0:01:32.060000 --> 0:01:37.340000 attachments and also to be used to prevent people from accidentally transmitting 0:01:37.340000 --> 0:01:42.320000 emails that might contain sensitive company confidential information. 0:01:42.320000 --> 0:01:46.080000 From there, we'll go into the mitigation technology for web-based threats. 0:01:46.080000 --> 0:01:50.620000 How do you protect your users within your company from accessing sites 0:01:50.620000 --> 0:01:56.680000 that contain malware or from using websites such as Dropbox or Gmail or 0:01:56.680000 --> 0:02:01.420000 Google Drive to upload company confidential information? 0:02:01.420000 --> 0:02:03.360000 We want to protect against data loss. 0:02:03.360000 --> 0:02:05.500000 In other words, data loss protection. 0:02:05.500000 --> 0:02:10.120000 How do we ensure that people within my company are using websites and 0:02:10.120000 --> 0:02:12.720000 adhering to the acceptable use policies? 0:02:12.720000 --> 0:02:16.800000 We'll talk about things like Cisco's web security appliance. 0:02:16.800000 --> 0:02:20.620000 I'll introduce you to that as well as Cisco's cloud web security, which 0:02:20.620000 --> 0:02:24.880000 is a cloud-based alternative to the web security appliance. 0:02:24.880000 --> 0:02:28.440000 Then the third and final piece of this course will be mitigation technology 0:02:28.440000 --> 0:02:30.580000 for endpoint threats. 0:02:30.580000 --> 0:02:34.200000 Here, I'll spend a little bit of time going over the basics of what is 0:02:34.200000 --> 0:02:38.640000 malware? What's the difference between viruses and worms and Trojan horses 0:02:38.640000 --> 0:02:43.100000 and root kits and ransomware and all this nasty stuff that you hear about? 0:02:43.100000 --> 0:02:46.900000 The event that you're not familiar with those terms will have a few videos 0:02:46.900000 --> 0:02:50.340000 that's giving you an introduction to what those terms are and how those 0:02:50.340000 --> 0:02:53.020000 types of malware are different from each other. 0:02:53.020000 --> 0:02:57.360000 Then we'll finish up with what can you do on the actual endpoint itself 0:02:57.360000 --> 0:03:01.140000 to protect it from those various different types of malware? 0:03:01.140000 --> 0:03:06.820000 If malware and attacks happen to make it through your firewall, your email 0:03:06.820000 --> 0:03:10.980000 security appliance or your web security appliance, what alternatives do 0:03:10.980000 --> 0:03:15.020000 you have left once it reaches the laptop for that laptop to be able to 0:03:15.020000 --> 0:03:19.700000 take evasive action and to mitigate those problems? 0:03:19.700000 --> 0:03:21.100000 I hope you're excited. 0:03:21.100000 --> 0:03:25.260000 I know I am. Let's get started and let's learn about some of these strategies 0:03:25.260000 --> 0:03:28.100000 for content and endpoint protection.