This live web event has ended. Thank you for attending.
This course provides a concise overview of leading cyber security practices and tools. This includes keeping authorized users from accessing your computing systems, and ensuring your employees follow safe computing habits. Discover how to instantly improve your security posture with limited resources and protect your IT environment from cyber threats, vulnerabilities, risks, attacks, and breaches.