Malicious software exists in many forms. This course will cover many types of malware including worms, trojans, viruses along with rootkits and back-doors. It then will cover business continuity, hot and cold sites, redundancy, and backups. Finally it will look at specifics of how to recover from disasters and how it ties into risk management. This course contains the following lessons:
Lesson 1:
Lesson 2:
Lesson 3:
Lesson 4:
Lesson 5:
Lesson 6:
Lesson 7:
Lesson 8: