This course provides an introduction to the four pillars of cyber security and their impact on an organization. Attendees examine real cyber attacks and countermeasures to deploy against them.
- Check integrity of data at rest
- Provide data confidentiality
- Evaluate authentication methods
- Select encryption methodologies
- Solve the key distribution problem