Operational Cybersecurity 1a: Introduction
Sorry! The enrollment period is currently closed. Please check back soon.
Full course description
Even when we use the strongest bricks, Firewalls can be breached and other security measures can be exploited by malicious cyberattackers. In this course, you will assume your role as Chief Information Security Officer (CICO) responsible for a data network’s design, maintenance, and end-user training. You will explore essentials of keeping networks safe and secure through the use of cryptology, keys, and certificates before moving into the important practice of risk assessment. In the end, your attention will shift to mitigating and managing identified risks and working with key stakeholders to improve the organization’s security posture and disaster response. Are you ready to help businesses protect personal information and outsmart cyber attackers? Grab your white hat, BYOD, and let’s get started!