3 hours 35 minutes
hello and welcome to P C Security Intermediate course.
Since this video, I will do the short recap of the whole module
that is about protecting the PC hardware. So what you have learned in this module first thing is details of PC architectures. So basically what the pieces consisting off and which components are interesting from security perspective. Not all of them are like
case or parse apply.
Then I talked about your five buyers what the unified bio sees. What are the characteristics of you if I bias, What is it doing in a PC
and why is it so important from securities perspective? So, in general, just make things very short.
Porton security risk is because if it's changed or manipulated, anything that is done kept simply cannot be detected by anti wires program. Okay, if you have seen that, for example, Dell has a way to detective, it's being changed.
it's not something that you just scanned. When it happens, you have to do it on a regular basis. In the meantime, something can happen badly,
you have learned is Bella's how one U. S. A. U efi malware works
and the methods for protection, your PC harder. And finally I touched a little bit about physical pieces security, but not in term of how to protect your PC's from actually being stolen
as much as of what to do when they are stolen or just how to behave to avoid them being stolen
in the next lesson. I'm starting new model and a model, and I will be talking about types off attacks on operating system.
Intermediate Endpoint Security
In this course, students will learn the importance of endpoint security. The course will ...
3 CEU/CPE Hours Available
Certificate of Completion Offered
Cloud computing test helps to gauge whether the candidate is skilled enough to work as ...