Live Instructor Teaching
Certificate of Completion
Courseware: Print
Free 6 Month Online Retake
Hands-On Learning?: Yes
Software Lab Included?: Yes
Group Teams
@ Your Location
Group Teams
@ Your Organization
In this course, you will identify and apply security techniques. First, you will explore types of security threats, both cyber and physical. Afterward, the class will continue exploring types of security measures and maintaining file system security. You will explore how to protect digital information and discuss types of malware such as viruses, worms, trojans, phishing, software detection, and finishes with file extensions. At the end of the class, you will explore methods to keep the cloud and virtualized environments secured.
Upon successful completion of this course, students will be able to:
This course is intended for end users who use computers at home or in the office.
Students should understand fundamental computer concepts, such as how to run applications, manage files, and use a web browser.
Lesson 2: Guarding Against Social Engineering Exploits
Lesson 3: Identifying Security Measures
Lesson 4: Maintaining File System Security
Lesson 5: Guarding Against Attacks
Lesson 6: Handling Security Breaches
Lesson 7: Identifying Cloud Computing And Virtualization Security Methods
Appendix A: Security and Privacy Regulations