This course provides an introduction to the four pillars of cyber security and their impact on an organization. Attendees examine real cyber attacks and countermeasures to deploy against them.
- Check integrity of data at rest
- Provide data confidentiality
- Evaluate authentication methods
- Select encryption methodologies
- Solve the key distribution problem
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.