- Select type of product.
|1 - 4||5 +|
Duration: 25 Minutes Language: English
Describe the role in ensuring and maintaining security.
Identify methods that are commonly used to protect software and data on corporate devices.
Recognize the need for and approaches to ensuring security online.
List best practices necessary to ensure the physical security of commonly-used devices.
Certificate of Completion. *Valid for 2 years.
Examination record available for employer.
Section 1030 of Title 18 of the United States Code (18 U.S.C. §1030).
28 Types of Computer Security Threats and Risks. Retrieved November 01, 2017, from https://www.itscolumn.com/2012/03/28-types-of-computer-security-threats-and-risks/.