Video Description

Troubleshooting Security Issues Part 3 For this segment of the module, we look at the necessary steps to cleaning an infected system, and steps to assure Malware is gone. Before we remove malware, we review how identify the characteristics of malware such as strange behavior and security alerts. Then we discuss how to quarantine and what that process really does, how to determine if we need to disable system restore and how to remediate an infected computing system and what we need to do to verify our desired removal outcomes.

Course Modules

Troubleshoot Critical Systems