Description
Coverage includes the principles of information confidentiality, integrity, and authenticity. security models and policies, identifying threats, fundamentals of risk analysis and risk management Understanding Cryptography including symmetric vs. public key, key distribution, and digital signatures, physical security, database and e-mail security will also be covered.