Explora nuestro catálogo interactivo de cursos y lleva tu desarrollo profesional al siguiente nivel. 📚✨
Malicious software exists in many forms. This course will cover many types of malware including worms, Trojans, viruses along with rootkits and back-doors. It then will cover business continuity, hot and cold sites, redundancy, and backups. Finally it will look at specifics of how to recover from disasters and and how it ties into risk management. This course is part of a series covering the ISC(2) Certified Information Systems Security Professional (CISSP).
Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.
Audio Languages | |
---|---|
Content Style | |
Primary Competency | |
Content Features | |
Course Text Languages | |
Subtitle Languages | |
Seat Time |
© 2025 Escal8. Todos los derechos reservados.