Full course description
Examine when and how to secure data. Study how to securely store data, the transmission of data, and how to secure payment systems. Lastly, consider ways to monitor our security measures and identify legal requirements surrounding cybersecurity.