...

/

Challenge — Information Flow

Challenge — Information Flow

Evaluate your understanding of the way information flows to endpoint devices.

We'll cover the following...
Missing Cards - Vertical
List the order in which security controls information flows from the internet to a user's laptop. This represents how a defense in depth approach can prevent an attack.

All Cards
1
2
3
4
5
Missing Cards
(Drag and drop the cards in the blank spaces)

Access this course and 1400+ top-rated courses and projects.