CISM 2022: Secure Device & OS Management

placeholder

IT departments must work in conjunction with higher-level management to determine when and how to securely use technological solutions that support the business strategy.

In this course begin by exploring how mobile device usage in a business environment can introduce risk and how that risk can be managed with centralized remote wipe capabilities. Then find out how Microsoft Intune can be used to centrally manage devices and how to securely wipe a disk partition. Learn how to harden Windows computers using Group Policy and disable the deprecated SSL network security protocol on Windows hosts. Next investigate common digital forensics hardware and software solutions as well as the storage area network (SAN) security and jump box solutions to manage hosts securely and remotely. Finally discover how to manage Azure resources permissions using managed identities examine device and OS hardening techniques and investigate the importance of firmware and software patching.

This course can be used to prepare for the Certified Information Security Manager (CISM) exam.