2 hours 27 minutes
Welcome back to intermediate endpoint Security Course in this video, I'll just do a short recap about this model. That was because rather short model and it was talking about protecting data.
So you learned off all classifications of data that can exist on user PC's. And then I have talked about protecting data from being stolen, whether physically being thrown us so into some kind of cybercrime and then again protecting data from being destroyed or lost
the next session. I lex lesson. Sorry. I will do a short recap off this entire course.