fbpx

Securing Hosts and Data

Courses

In this chapter, student’s will learn:

  • About malware
  • How to secure data
  • How to secure hosts and applications

At completion of this course student’s will understand the following:

  • Identify malware according to its payload and transmission vector, as well as how malware hides from detection
  • Secure data at rest through classification, file permissions, and storage encryption
  • Secure hosts, whether they’re ordinary workstations, servers, or static devices