01. Project Overview

Project Overview

ND545 C1 L6 01 Hands On Cybersecurtity Fundamentals Video

Summary

Congratulations!

You have been hired to secure the PC used at your friend’s business: Joe's Auto Body. Joe provides car repair services throughout the area. His previous employees used it for activities unrelated to work (e.g., web browsing, personal email, social media, games, etc.) and he now uses it to store his critical business information. He suspects that others may have broken into it and could be using it to transfer files across the internet. He has asked that you secure it for him according to industry best practices, so it can be once again used as a standard PC.