Gain an overview of cybersecurity risk management and discuss its three facets: protect; detect; and respond.
1 Topic
Explore basic concepts; design; and architecture of computer security systems and their operation.
1 Topic
Review and gain an understanding of the multiple laws that regulate cybersecurity and the different levels of protection they provide.
1 Topic
Explore the cyber threat landscape; identify the types of threats and vulnerabilities; and understand how they can affect businesses and people's everyday lives.
1 Topic
Analyze the federal government's responses to cyberattacks in cities.
1 Topic
Identify and analyze fundamental principles and concepts of IAM and best practices for identification; authentication; and authorization to allow access to computer systems and data resources.
1 Topic
Gain deeper knowledge of IAM best practices by exploring perspectives on administration and technology; layers and practices; the benefits of single sign-on; and federated identity management.
1 Topic
Become familiar with the various job responsibilities of an IAM analyst.