Overview
This course will guide you in developing working knowledge of how computers and mobile devices operate; identify common security threats and vulnerabilities like malware, phishing, spoofing and social engineering; and apply skills and procedures to install, configure, and troubleshoot computers, mobile devices, and software.