The course discusses what risks exist and what one can do to protect his/her precious personal and business data from the outside world. Throughout the course, students understand and explore the many vulnerabilities of operating systems, software, and networks; delve into the minds of hackers and crackers, developing an understanding of the exploits they use to access somebody's computer without his/her knowledge. On completion of the course, participants know why, where, and how viruses, worms, and blended threats are created; students are able to identify and work to prevent DoS, SYN flooding, and other network attacks, safely share files and data across the Internet through a virtual private network, install and configure a firewall to build an impenetrable moat around your computer or network.
هیچ نظری موجود نیست:
ارسال یک نظر