Time
3 hours 35 minutes
Difficulty
Intermediate
CEU/CPE
4

Video Transcription

00:00
hello and welcome to P C Security Intermediate course.
00:04
Since this video, I will do the short recap of the whole module
00:09
that is about protecting the PC hardware. So what you have learned in this module first thing is details of PC architectures. So basically what the pieces consisting off and which components are interesting from security perspective. Not all of them are like
00:28
case or parse apply.
00:30
Then I talked about your five buyers what the unified bio sees. What are the characteristics of you if I bias, What is it doing in a PC
00:41
and why is it so important from securities perspective? So, in general, just make things very short.
00:50
It's most
00:51
Porton security risk is because if it's changed or manipulated, anything that is done kept simply cannot be detected by anti wires program. Okay, if you have seen that, for example, Dell has a way to detective, it's being changed.
01:11
But
01:12
it's not something that you just scanned. When it happens, you have to do it on a regular basis. In the meantime, something can happen badly,
01:23
you have learned is Bella's how one U. S. A. U efi malware works
01:30
and the methods for protection, your PC harder. And finally I touched a little bit about physical pieces security, but not in term of how to protect your PC's from actually being stolen
01:42
as much as of what to do when they are stolen or just how to behave to avoid them being stolen
01:52
in the next lesson. I'm starting new model and a model, and I will be talking about types off attacks on operating system.

Up Next

Intermediate PC Security

The Intermediate PC Security course will teach students about endpoint protection. Students will learn fundamental information about PC Security and common attack vectors.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor