Identifying Cybersecurity Threats

The connected IT systems that create so much opportunity for modern organizations also make them more susceptible to cyber threats. This course covers a broad array of cybersecurity topics that may impact an XProtect VMS installation and other corporate IT systems and assets.

After completing this course, system integrators and administrators will be able to:

  • Network, server, client, and device vulnerabilities.
  • Physical access and tampering.
  • Human or behavioral vulnerabilities.

BEGINNER

45m

Hardening XProtect VMS

Hardening is a continuous process of identifying and understanding security risks and taking appropriate steps to counter them. In the Hardening XProtect VMS course, you apply different types of security measures in operating systems, networks, and XProtect VMS itself.

After completing this course, system integrators and designers will be able to:

  • Describe common security problems with video surveillance installations.
  • Explain how a holistic approach is needed to combat security risks.
  • Determine critical considerations for choosing the appropriate security measures.
  • Describe the process of implementing improved security.

INTERMEDIATE

30m

Managing Secure Access in XProtect Advanced

Managing access for users of XProtect is an important security topic to discuss when planning, implementing, and maintaining a Milestone XProtect VMS. This course covers how to configure users and roles and profiles for a more secure system.

After completing this course, partners and integrators will be able to:

  • Describe the relationship of Users, Roles, and Profiles.
  • Use the Principal of Least Privilege (PoLP).
  • Create and copy a Role.
  • Assign Users to Roles.
  • Assign Profiles to Roles.

BEGINNER

20m

Milestone Server Communication Encryption

Server encryption is an important security topic to discuss when planning and implementing a Milestone XProtect VMS. In this course, you explore encryption options for network communications.

After completing this course, system designers and integrators will be able to:

  • Describe the basics of computer-to-computer encryption.
  • Explain server communication encryption.
  • Determine critical considerations for enabling communication encryption.
  • Describe the process of applying server communication encryption.

INTERMEDIATE

30m