In this chapter, student’s will learn:
- About malware
- How to secure data
- How to secure hosts and applications
At completion of this course student’s will understand the following:
- Identify malware according to its payload and transmission vector, as well as how malware hides from detection
- Secure data at rest through classification, file permissions, and storage encryption
- Secure hosts, whether they’re ordinary workstations, servers, or static devices