This course provides the student with an intermediate understanding of cybersecurity and covers the concepts involved in maintaining a secure computing and networking environment. Students will learn a variety of cybersecurity methodologies and technologies used to implement a secure computing environment. Upon successful completion of this course, students will be able to examine and describe concepts of cybersecurity and create a working secure computing and networking environment.
Operate with awareness of principles of governance, risk, and compliance. Explore cybersecurity architecture. Implement access control and identity management practices.