The student who successfully completes this course will:
- Describe the characteristics of criminals and experts in the world of cybersecurity.
- Explain how the principles of privacy, integrity, and availability are related to data states and cybersecurity measures.
- Describe the tactics, techniques, and procedures used by cybercriminals.
- Explain how technologies, products, and procedures are used to protect privacy.
- Explain how technologies, products, and procedures are used to ensure integrity.
- Describe how technologies, products, and procedures provide high availability.
- Explain how cybersecurity experts use technologies, processes, and procedures to defend all components of a network.
- Explain the purpose of laws related to cybersecurity.