This course discussed the main policies and resources for IT as it pertains to organizations and businesses.This course defined the term the “Internet of Things” or IoT. IoT consists of billions of devices that are connected to the Internet and communicate through it and extremely convenient but increase our cybersecurity risks. This course reviews how to use these things safely.This course discussed some of the more common cybersecurity threats, such as malware, ransomware and phishing. It also reviewed some of the newer threats, such as cryptojacking and shadow IT, and ways to prevent these threats from occurring.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept