K2's Filtering the World - Spam, Virus, and Malware Protection

K2's Filtering the World - Spam, Virus, and Malware Protection

Bad actors want inside your systems and want to steal your data. They can attack your systems directly or they can use your email inbox as the conduit for the attack by sending phishing messages. Regardless of the method they used,  these crooks all want the same thing – access to your sensitive information!

In this session, you will learn about your  options for spam, virus and malware protection. More specifically, you will learn about where your greatest risks are and the need for a layered approach to security.  Additionally, you learn about different types of tools you can use to construct a multi-layered defense system, including tools such as Unified Threat Management (UTM), Data Loss Prevention (DLP), and heuristic-based approaches to preventing malware, viruses, and ransomware from infecting your systems. If you’re concerned about data security — and who isn’t? – then participate in this session to learn how you can manage risk more effectively.

Learning Objectives

Upon completing this course, you should be able to:

  • Identify threats that need protection
  • Differentiate the most effective protection methods
  • List the protection options that you can use
  • Apply the knowledge to protect your systems
Course Information

CPE credit: Recommended for 2 hours Information Technology

Instructional Delivery MethodQAS on-demand learning, including review and final exam questions. To earn credit, participants must pass the final exam with a score of 70% or better within one year of registering for this course. Participants may attempt take the final exam up to 10 times.

Prerequisites: Fundamental knowledge of computer operations and security needs

Program level: Intermediate

Advance preparation: None

Who should participate: Business professionals who are seeking to increase the security of sensitive and critical data

To register for “K2’s Filtering the World – Spam, Virus, and Malware Protection” click “Start” below, or if you have already registered and wish to resume your course, click “Log In and Resume.” Additionally, please note the you must have cookies enabled in your browser in order to register for and complete an on-demand program.