Malicious code and information security


Overview/Description
To introduce how malicious code works and the ways to defeat it in a wired and wireless environment

Target Audience
Business users requiring an introduction to information security best practices

Prerequisites
A basic knowledge of computer concepts and experience of using end-user applications in a business environment

Expected Duration
100 Minutes

Objectives:

Malicious code and information security

  • recognize behaviors that lead to infection by malicious code.
  • recognize how to detect, respond to, and recover from malicious code attacks.
  • recognize how to combat malicious code.
  • categorize examples of malicious code threats to wireless devices.
  • recognize how wireless devices are secured.
  • recognize examples of wireless malicious code threats.

  • Course Number: 217043_eng