3 hours 35 minutes
hello and welcome to P C Security Intermediate Course.
In this video, I will talk about what you have learned in this module, which is about the importance of pieces security. So you have learned about specifics of PC security wise. So is it is so different than securing other parts of I t network.
Would you like infrastructure like servers or storage or networking equipment?
And the reason for that, among others, is the fact that PC is used by people who don't necessarily have to have any knowledge about die teeth. So this is just a tool for them to do business
on. And this poses some some difficulties in securing PC compared to other
parts of the I T infrastructure that is primarily used by experts.
Then I talked about the text surface off a PC,
and very bunch link to that was
was two videos about the tax collectors of a PC. So in these four videos, you have learned about the things that can be attacked and the ways that they're being attacked, and and in the end, off the whole
module, you have learned about what are actually the goals of PC security,
so this is setting the groundwork for lessons to come, because I will not be touching things that are outside the scope of what is considered to be PC security.
There is something called endpoint security, and there is a course here on cyber in which I explained these things. Ah, a little bit more detail,
which is way. So the endpoint security is touching a little bit more than just the PC security itself. So if you think that some things have been missed, this is because I'm explaining them in the course that is called intermediate endpoint security.
Intermediate Endpoint Security
In this course, students will learn the importance of endpoint security. The course will ...
3 CEU/CPE Hours Available
Certificate of Completion Offered
Cloud computing test helps to gauge whether the candidate is skilled enough to work as ...