Milestone Server Communication Encryption
Server encryption is an important security topic to discuss when planning and implementing a Milestone XProtect VMS. In this course, you explore encryption options for network communications.
After completing this course, system designers and integrators will be able to:
- Describe the basics of computer-to-computer encryption.
- Explain server communication encryption.
- Determine critical considerations for enabling communication encryption.
- Describe the process of applying server communication encryption.
Managing Secure Access in XProtect Advanced
Managing access for users of XProtect is an important security topic to discuss when planning, implementing, and maintaining a Milestone XProtect VMS. This course covers how to configure users and roles and profiles for a more secure system.
After completing this course, partners and integrators will be able to:
- Describe the relationship of Users, Roles, and Profiles.
- Use the Principal of Least Privilege (PoLP).
- Create and copy a Role.
- Assign Users to Roles.
- Assign Profiles to Roles.
Hardening XProtect VMS
Hardening is a continuous process of identifying and understanding security risks and taking appropriate steps to counter them. In the Hardening XProtect VMS course, you apply different types of security measures in operating systems, networks, and XProtect VMS itself.
After completing this course, system integrators and designers will be able to:
- Describe common security problems with video surveillance installations.
- Explain how a holistic approach is needed to combat security risks.
- Determine critical considerations for choosing the appropriate security measures.
- Describe the process of implementing improved security.
Identifying Cybersecurity Threats
The connected IT systems that create so much opportunity for modern organizations also make them more susceptible to cyber threats. This course covers a broad array of cybersecurity topics that may impact an XProtect VMS installation and other corporate IT systems and assets.
After completing this course, system integrators and administrators will be able to:
- Network, server, client, and device vulnerabilities.
- Physical access and tampering.
- Human or behavioral vulnerabilities.
Configuring and Using the Bulk Password Manager
Keeping cameras secure is vital to maintaining overall system security. The bulk password manager allows you to generate random passwords on all supported cameras on a schedule.
After completing this course, system integrators and administrators will be able to:
- Create a new rule.
- Selecting a time for recurrence.
- Change passwords on all devices.