Certified in Cybersecurity (CC): Data Security & System Hardening

placeholder

“For many organizations data is the most critical asset to be secured.

Begin this course by exploring the data life cycle or the different phases a piece of data goes through from data creation to data destruction. You will focus on each of the six phases including create store use share archive and destroy. Then you will learn how to log and monitor security events using modern enterprise and cloud-based solutions. Next you will investigate encryption hashing and digital signing. Finally you will discover system hardening practices like patch management.

This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.”