Endpoint Protection
Learn to use practical reasoning and techniques to maximize the effectiveness of security resources to protect an organization's devices.
Types of endpoints
The days of a heterogeneous environment are gone. Endpoints come in a variety of shapes and sizes, including:
-
Servers
-
Desktops
-
Laptops
-
Mobile phones
-
Tablets
Operating systems
Just as an endpoint’s form factor can vary greatly, so can the operating systems running on those devices, which include:
-
MacOS
-
Android
-
Chrome OS
-
Apple iOS
-
Windows Mobile OS
-
Various distributions of Linux ...