In Introduction to IT Security, you鈥檒l develop a comprehensive understanding of security management. You鈥檒l learn about risk assessment and management concepts, analyze quantitative and qualitative risk, and familiarize yourself with various types of security controls. Upon completing this course, you鈥檒l be able to: 鈼 Understand the security management process 鈼 Harden endpoint devices including mobile and IoT devices 鈼 Manage incident responses effectively and plan for business continuity 鈼 Implement network security including firewalls, IDS/IPS, wireless security, remote access, and cloud computing Throughout this course, hands-on labs will enable you to apply security concepts to real-world scenarios. These range from practicing the application of security to networks, hacking simulations, to forensic simulations. At the end of this course, you鈥檒l complete a capstone project, allowing you to showcase the knowledge and skills you learned throughout the course.