Introduction to Cybersecurity
Completion requirements
Provides a foundational overview of how to protect digital devices, networks, and data from malicious attacks and organizational cyber hygiene.
3. Computer Security & Access Control
Operating System Security
This involves protecting the core software that manages hardware and software resources. A secure OS:
-
Prevents unauthorized access through user authentication.
-
Uses file permissions to control who can read, write, or execute files.
-
Applies security patches to fix vulnerabilities.