Securing Server, Desktop and Portable Systems
|Lecture hours per week|
|Lab hours per week|
This course will explore the differences in security requirements imposed by various computers which make up today’s business computing environment. Software tools to satisfy these requirements will be reviewed, together with the physical security requirements of the various environments.