Du er ikke logget ind
Beskrivelse
Chapter 1: Security 101
· Introduction
· What is it?
· Why is it important?
· When is it necessary?
· Who is responsible for it?
Chapter 2: Risky Business
· Risk
· Assessments
· Matrix
· Tolerance/Appetite
Chapter 3: (Return of) the Mac
· macOS
· Hardware
· Software
· Distribution
· Frameworks (Security, Privacy, etc.)
Chapter 4: A World of Hurt
· Threat types
· Attack types
· Internal attacks
· External attacks
Chapter 6: The Mind of an Attacker
· Think like them
· Act like them
· Understand them
· Protect against them
Chapter 7: Hardware Solutions
· Startup
· Full-Disk Encryption
· Cable Lock
· Sensor Covers
· Accessories
· Licensed Cables
Chapter 8: Software Solutions
· Passwords
· Login
· User Account Types
· Multifactor Authentication
· FileVault
· System Preferences
· Screensaver
· Lock-screen
· Malware Protection
· Firewall
· VPN/ZTNA
· iCloud
· App Stores
· Secure Memory
· Transparency, Consent, and Control (TCC)
· Touch ID
· Apple Software Update
· 3rd-party Patches
· File Permissions
· Sharing Permissions
· Extensions
· Backups
· Remote Wipe
Chapter 9: Work Smarter, Not Harder
· Remote Controlling your fleet
· Mobile Device Management
· Device Configuration
· App Deployment
· Securing Devices
· Automating Workflows
· Zero Touch
Chapter 10: Make a Plan and Stick to It
· Standardize your environment
· &nb