This session will guide you through the decision-making process, which involves networking issues. We will discuss topics such as wireless and standard, cloud, infrastructures, bandwidth, purchasing for digital hardware/software, and implementing safe and secure technologies for any environment. Lastly, we will review a sample checklist that can be utilized for Cyber Security, Information Security Policy, Security Controls, and Vulnerability Assessment.
You will learn:
• Better understanding of your Infrastructure
• Be able to start developing a Cybersecurity Assessment
• Understanding of Policies and different types of malware