Computer Security

Technologies are often subject to threats from a variety of sources, and can jeopardize the work you do, and the content you create and save on your computer. These threats can take the form of external hackers attempting to break into information on your computers and online accounts. Threats can also involve a colleague who might accidentally or intentionally divulge sensitive information.

What does this course cover?

  • Describe their role in ensuring and maintaining security.

  • Identify methods that are commonly used to protect software and data on corporate devices.

  • Recognize the need for and approaches to ensuring security online.

  • List best practices necessary to ensure the physical security of commonly-used devices.

What are the course takeaways?

  • Knowledge of computer security.

  • Certificate of Completion (immediately available for download and/or print).

  • Examination record available for employer.

Regulations – 

  • Section 1030 of Title 18 of the United States Code (18 U.S.C. §1030)

  • 28 Types of Computer Security Threats and Risks. Retrieved November 01, 2017, from http://www.itscolumn.com/2012/03/28-types-of-computer-security-threats-and-risks/

Duration: 25 Minutes
Languages: English
Price: $45

Order Button 129    Order Button 110

Scroll to Top