K2's Filtering the World - Spam, Virus, and Malware Protection
Bad actors want inside your systems and want to steal your data. They can attack your systems directly or they can use your email inbox as the conduit for the attack by sending phishing messages. Regardless of the method they used, these crooks all want the same thing – access to your sensitive information!
In this session, you will learn about your options for spam, virus and malware protection. More specifically, you will learn about where your greatest risks are and the need for a layered approach to security. Additionally, you learn about different types of tools you can use to construct a multi-layered defense system, including tools such as Unified Threat Management (UTM), Data Loss Prevention (DLP), and heuristic-based approaches to preventing malware, viruses, and ransomware from infecting your systems. If you’re concerned about data security — and who isn’t? – then participate in this session to learn how you can manage risk more effectively.
Learning Objectives
Upon completing this course, you should be able to:
- Identify threats that need protection
- Differentiate the most effective protection methods
- List the protection options that you can use
- Apply the knowledge to protect your systems
Course Information
CPE credit: Recommended for 2 hours Information Technology
Instructional Delivery Method: QAS on-demand learning, including review and final exam questions. To earn credit, participants must pass the final exam with a score of 70% or better within one year of registering for this course. Participants may attempt take the final exam up to 10 times.
Prerequisites: Fundamental knowledge of computer operations and security needs
Program level: Intermediate
Advance preparation: None
Who should participate: Business professionals who are seeking to increase the security of sensitive and critical data