Introduction to Cybersecurity
Completion requirements
Provides a foundational overview of how to protect digital devices, networks, and data from malicious attacksĀ and organizational cyber hygiene.
2. Authentication and Cryptography
Passwords and Multi-Factor Authentication (MFA)
-
Passwords are the most basic form of authentication, but they can be weak if reused or simple.
-
MFA adds extra layers like
-
Something you know (password)
-
Something you have (phone or token)
-
Something you are (fingerprint or face scan)
-