Full course description
Segment 2: We depend more and more on the technologies we interact with every day, and we put more and more of our personal data out there online. Can all of that data really be kept “secret”? We all need to know more about how to protect our personal information, especially given how much we rely on and use our network devices and media. You‘ll learn about the various parts of your computer, how they work together, and how you can manipulate them to keep your data safe. You’ll also dive into the tools, technologies, and methods that will help protect you from an attack and discover the many opportunities in the rapidly growing field of cybersecurity.
PLEASE NOTE: This course is segment two of a two segment course. If you are taking this for your online course requirement, you must complete BOTH segments to meet the requirement. Please sign up for segment two AFTER you complete segment one.
Segment 2 Units (This course)
- Unit 5: Access Control
- Unit 6: Mobile Devices and Cloud Computing
- Unit 7: Protecting Data
- Unit 8: Trends and Challenges
Segment 1 Units (Course should already be completed)
- Unit 1: Basics of Cybersecurity
- Unit 2: Computers and Operating Systems
- Unit 3: Networking Fundamentals
- Unit 4: Network Security