Certified Information Systems Security Professional, Part 7 of 9: Malware and Business Continuity

with expert Kevin Henry

Malicious software exists in many forms. This course will cover many types of malware including worms, Trojans, viruses along with rootkits and back-doors. It then will cover business continuity, hot and cold sites, redundancy, and backups. Finally it will look at specifics of how to recover from disasters and and how it ties into risk management. This course is part of a series covering the ISC(2) Certified Information Systems Security Professional (CISSP).


Advanced | 2h 33m | March 22, 2018

Security

Course Outline


Kevin Henry

Kevin is an international author, consultant and international <br />speaker. He is the official course development writer for ISC2 CISSP, ISACA CRISC and mile2&rsquo;s C)ISSO. Kevin has been educating IT professionals for over 30 years. He also provides cyber security consulting and support services for organizations around the world. Assisting them with setting up Information Security programs and addressing areas ranging from in-depth risk analysis to policy creation and security awareness.




Explore Our Blogs, Courses and Webinars