text
hidden text to trigger early load of fonts ПродукцияПродукцияПродукцияПродукция Các sản phẩmCác sản phẩmCác sản phẩmCác sản phẩm المنتجاتالمنتجاتالمنتجاتالمنتجات מוצריםמוצריםמוצריםמוצרים

Zero Trust and Securing the Endpoint

-- Generating

If download hasn't started

Course Overview

Explore Intel's role in modern cybersecurity, with a particular emphasis on securing vulnerable endpoints—a foundational tenet of Zero Trust architecture. Join Jonathan Nguyen-Duy, Field CISO and Zero Trust Practice Lead at Intel, as he highlights the state of cybersecurity, discusses the significance of securing AI workloads, and addresses common threats like malware, ransomware, cryptojacking, and phishing. Learn how Intel's integrated hardware and software solutions, including Intel® Threat Detection Technology, can help enhance endpoint protection, detect sophisticated attacks, and improve overall security posture. Upon completion, you will have a deeper understanding of how Intel solutions help build trusted digital experiences backed by robust endpoint security strategies.

Share With

Chapter 1: Zero Trust and Securing the Endpoint

Chapter List

Quiz Status

Please watch the video before taking the quiz.

Once you have watched the video, please take the quiz.

Chapter Overview

Explore Intel's role in modern cybersecurity, with a particular emphasis on securing vulnerable endpoints—a foundational tenet of Zero Trust architecture. Join Jonathan Nguyen-Duy, Field CISO and Zero Trust Practice Lead at Intel, as he highlights the state of cybersecurity, discusses the significance of securing AI workloads, and addresses common threats like malware, ransomware, cryptojacking, and phishing. Learn how Intel's integrated hardware and software solutions, including Intel® Threat Detection Technology, can help enhance endpoint protection, detect sophisticated attacks, and improve overall security posture. Upon completion, you will have a deeper understanding of how Intel solutions help build trusted digital experiences backed by robust endpoint security strategies.