Course DescriptionIn this course, you will learn about the current state of IT security, or cybersecurity. Due to the integration of computers and related technology into our work environment and personal activities, security has become crucial for everyone. Cybersecurity, isn't just about protecting computers, networks, programs, and data from unintended or malicious access, change, or destruction. Cybersecurity is also about ensuring that business functions and personal tasks can still be performed with minimal interference and at a reasonable response, or throughput rate. Throughout this course you will learn about the various types of threats that can harm an organization. You will also explore the range of security responses that can be used to defend against compromises and violations and you will discover the role of IT security in risk management.
- A strong foundation in basic networking concepts
- A solid understanding of TCP/IP protocols and how they work
James Michael Stewart
Michael has over 30 years experience with computers and technology with a focus on security, certification, and various operating systems. He has been teaching job skills and certification courses on topics ike CISSP, ethical hacking and penetration testing, computer forensics, and Security Plus for over 20 years. He is also the primary author of two books and holds a variety of certifications including CISSP, CEH, CHFI, ECSA, and Security Plus.