Organizations today increasingly rely on the Internet and networked systems to conduct business. At the same time, cyber-crime and security violations pose an ever-growing threat to business-critical functions and data. To mitigate security threats, safeguard sensitive data and maintain business continuity, it is essential that computers and networks be protected.
In this course, you gain the knowledge and skills to effectively and accurately analyze the security risks to your computer and network systems. You also learn how to view security from the standpoint of the attacker, enabling a more successful implementation of Internet and system defenses. The issues of authentication, confidentiality, integrity, and availability form the core of the necessary analysis.
Whatever your business environment, there are steps you can take today to help ensure the integrity and confidentiality of your data.
- Analyze your exposure to security threats and protect your organization's systems and data
- Deploy firewalls and data encryption to minimize threats
- Assess alternative user and host authentication mechanisms
- Manage risks emanating from inside the organization and from the Internet
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.