![Loading Events](https://zeevee.wpenginepowered.com/wp-content/plugins/the-events-calendar/src/resources/images/tribe-loading.gif)
- This event has passed.
Certified Solution Partner Training Lesson – Security in an AV over IP Environment
January 25 @ 10:00 am - 11:00 am
![](https://zeevee.wpenginepowered.com/wp-content/uploads/2024/01/events_header_featuredimage_security-in-AVoIP.jpg)
Certified Solution Partner Training Lesson
Security in an AV over IP Environment
![icon-security-avoip icon-security-avoip](https://zeevee.wpenginepowered.com/wp-content/uploads/2024/01/icon-security-avoip.png)
WHAT:
Certified Solution Partner Training Lesson - Security in an AV over IP Environment
In this four part series, ZeeVee will cover social engineering, unauthorized access, malware attacks, and interception of data.EARN 1.0 CTS CREDIT!
WHO:
A technical discussion with Art Weeks, Director of Product & Tony Torres, Technical Support Engineer
Alternative Hosts: Jay Bolster, Global Support & Training Manager & Chris White, Technical Manager UK & Ireland
WHEN:
Thursday, January 25, 2024
TIME:
10:00 AM ET // 3:00 PM GMT // 4:00 PM CET // 2:30 PM IST // 11:00 PM SGT
WHERE:
Virtual Training via Zoom
![security-avoip security-avoip](https://zeevee.wpenginepowered.com/wp-content/uploads/2024/01/security-avoip.jpg)
AGENDA
Part 1: Introduction (5 Minutes)
Part 2: Social Engineering (15 Minutes)
- Social Engineering Attacks
- Impersonation
- Tailgating
- Eavesdropping
- Shoulder Surfing
- Phishing
- Pretexting
- Trust Manipulation
- User Manipulation
- Role-Based Permissions for Social
- Engineering Attacks
- Access Control
- Least Privilege
- Physical Security
- Employee Training
- Multi-Factor Authentication
- Authorization Policies
- Audit Trails (Logs)
Part 3: Unauthorized Access (10 Minutes)
- Account Management
- Idle Time
- Passwords
- Lockouts
- Application Logs
- Command Logs
Part 4: Malware Attacks (15 Minutes)
- Hardened Linux for Malware Attack
- Mitigation
- Open-Source Code
- Limited User Privileges
- Package Management
- Built-In Security
- Root Access Prevention
- Server Security Features
- Transport Layer Security
- Secure Shell
- Secure File Transport Protocol
Part 5: Interception of Data (10 Minutes)
- Endpoint Security
- 802.1X Access
- AES-128 Encryption
- Trust on First Use
- HDCP Encryption
Part 6: Wrap-Up (5 Minutes)
- Q&A Session