You will get to learn information and data life cycle process, cyber hygiene, forming security habits and procedures to protect information along with learning best practices to manage information security threats. There’s a common saying in IT about security, "Everyone knows they need security, but no one knows what security really means." After your Cyber Security training, you will. With tutorial videos to engage you with the study material for online use, take the path of least resistance to acing Cybersecurity foundations concepts. It's important to translate your knowledge into real life. This course comes with access to a simulated exam that gives you an assessment of what you have learned in this course. This course covers the following topics: 1. Course Introduction 2. Confidentiality, Integrity, and Availability (CIA) 3. Information security and Cybersecurity Definitions 4. Identity and Access Management 5. Data Security 6. Data and Information Lifecycle Process 7. Continuous Risk Awareness and Monitoring 8. Cyber Attacks 9. Cyber Hygiene 10. Cloud and the importance of availability of data to the mission
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.