Course Overview
Network security is one of the top priorities when we install and use software as we look to maintain the integrity of our data and devices. This cyber security course explains how to safeguard the confidentiality and integrity of sensitive information by using tokens, passwords and other methods used to keep applications working in real-world settings. We also trace the phases and lifecycle of software acquisition and development.