
Sabrina Long
Discuss the evolution of security based on historical events.
List various types of malicious software.
Describe key cybersecurity concepts including the CIA Triad, access management, incident response and common cybersecurity best practices.
Identify key cybersecurity tools which include the following: firewall, anti-virus, cryptography, penetration testing and digital forensics.
Issued on
March 26, 2024
Expires on
Does not expire