Protect Your Data from Hackers, Virus and Phishing Schemes

Course Access: Lifetime
Course Overview

“Your data may have been breached.”  It seems like that is a headline on an all too frequent basis.  These attacks can be avoided.  In this course we will discuss technologies that can be implemented to effectively prevent hacking attempts, viruses and phishing attempts from becoming a disastrous event.

This course helps you learn the meaning of key terminology and some tools and techniques that can be implemented to mitigate the risk associated with viruses, hacking attempts and phishing schemes. We delve into how attacks work and technology that can be implemented for prevention.  Lastly, we discuss simple controls that can be implemented, critical monitoring that should be performed, and important training that needs to occur.

Leave A Comment