Description: In this course you will learn the value of vulnerability assessments. Then, you will discover how to use those assessments to make powerful changes in an information systems security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack.
# of Days:
Setting: