
Kennesaw State University
In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it. After completing this course, a learner will be able to: â Define key concepts and terminology in Cybersecurity â Identify threats to cybersecurity â Identify strategies to identify and remediate vulnerabilities in inform
In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it. After completing this course, a learner will be able to: â Define key concepts and terminology in Cybersecurity â Identify threats to cybersecurity â Identify strategies to identify and remediate vulnerabilities in inform
Herbert J. Mattord, Ph.D., CISM, CISSP, CDP
Information Systems and Security
Michael Whitman, Ph.D., CISM, CISSP
Department of Information Systems and Security