Return to Work: New Compliance Tools and Training

Whether you’re returning or never left, get the new compliance tools and training you need.

Computer Security Overview

Learning objectives

  • Describe the importance of computer security in defending against internal and external threats
  • Identify methods that are commonly used to protect software and data on corporate devices
  • Recognize the need for and approaches to ensuring security online
  • List best practices necessary to ensure the physical security of commonly-used devices

Course overview

This lesson describes ongoing threats to computer security and emphasizes the importance of protecting an employer's digital property.

  • 12 Minutes
  • English
Course Outline
  • Computer Security Overview
Regulations
  • Section 1030 of Title 18 of the United States Code (18 U.S.C. §1030)
  • 28 Types of Computer Security Threats and Risks. Retrieved November 01, 2017, from http://www.itscolumn.com/2012/03/28-types-of-computer-security-threats-and-risks
Close Menu