Introduction to Secure
Welcome to the homepage for the Introduction to Secure Communications Course. To begin, complete the Course Introduction below. Once you have completed the introduction you can begin on the available course lessons.
This block of instruction will cover common risks and threat vectors associated with computers, cellular devices, and personal activities online.
This block of instruction will cover the fundamentals of protecting networks, computers, cellular devices, programs and data from cyberattacks, damage or unauthorized access.
This block of instruction will cover common threats associated with cellular devices, and broaden your understanding of your cyber footprint when using a cellular device.