If you do well in this course, you will be able to:
- Identify potential dangers to the network presented by trusted employees
- Explain key concepts and principles of in-depth security
- Explain physical and personnel security best practices
- Understand operating system security concerns
- Identify database security challenges