Google Learning Programs
search
Ctrlk
GithubFeedbackLinkedinOfficial WebsiteX
  • Google Learning Program 📚
  • Google IT Support Professional Certificatechevron-right
    • Course 1 Welcome to the First Course in the Series! 🎓🖥️chevron-right
    • Course 2 The Bits and Bytes of Computer Networking by Googlechevron-right
    • Course 3 Operating Systems and You: Becoming a Power User 🖥️chevron-right
    • Course 4 System Administration and IT Infrastructure Services 🌐chevron-right
    • Course 5 IT Security: Defense Against the Digital Dark Arts 🔐💻chevron-right
      • IT Security Course: Module 1 Overview 🔐chevron-right
        • 1.Introduction to IT Securitychevron-right
        • 2.Malicious Softwarechevron-right
          • The CIA Triad in Information Security 🔐
          • Essential Security Terms in IT Security 🛡️
          • Malicious Software (Malware) Overview 🦠
          • Antimalware Protection and Malware Removal 🛡️💻
          • Malware Continued: Advanced Threats and Techniques 🚨🖥️
        • 3.Network Attackschevron-right
        • 4.Other Attackschevron-right
      • Cryptology Overview 🔐chevron-right
      • The Three A's in Cybersecurity 🔐chevron-right
      • Secure Network Architecture 🛡️🌐chevron-right
      • Module 5 In-Depth Security Defense 🛡️🔒chevron-right
      • Congratulations on reaching the final module of the course! 🎉 Here’s what you’ll be focusing on:chevron-right
  • Google Project Manager Certification in Progress 🧑‍⚕️chevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Google IT Support Professional Certificatechevron-right
  2. Course 5 IT Security: Defense Against the Digital Dark Arts 🔐💻chevron-right
  3. IT Security Course: Module 1 Overview 🔐

2.Malicious Software

The CIA Triad in Information Security 🔐chevron-rightEssential Security Terms in IT Security 🛡️chevron-rightMalicious Software (Malware) Overview 🦠chevron-rightAntimalware Protection and Malware Removal 🛡️💻chevron-rightMalware Continued: Advanced Threats and Techniques 🚨🖥️chevron-right
PreviousIntroduction to IT Security Course 🔐chevron-leftNextThe CIA Triad in Information Security 🔐chevron-right

Last updated 1 year ago

Was this helpful?

Was this helpful?