3 hours 35 minutes
hello and welcome to P C Security Intermediate Course.
In this video, I will just do a short recap of the model that is just finished, which is one about protecting programs and applications on a PC. So in this model, you have learned, first of all, what ways the cybercriminals attack your programs.
And also, if you remember, I have mentioned there that
their focus is not so much on the programs unless they're doing some kind of targeted attack on a certain company or a certain organization or group of companies or government. Then they can use, for example, program updates to to spread their infection.
Next thing you learned these about how to protect the PC from its user essentially, how to limit users, or why do where you should limit user's privileges toe not to be admin privileges. And in this case, you can simply avoid some 85% of
issues with pieces security. Simply by doing that. And at the end, I'm I was talking about protecting browsing and two approaches in protecting browsing.
So this is the end of this module, and the next module I will just in next lesson story I will just the recap off entire course.
So you can have the idea off. What was this all about? Just there is a reminder.
Intermediate Endpoint Security
In this course, students will learn the importance of endpoint security. The course will ...
3 CEU/CPE Hours Available
Certificate of Completion Offered
Cloud computing test helps to gauge whether the candidate is skilled enough to work as ...