Protect Vulnerable Information

Big data needs big protection. As computer networks grow, so does the quantity of vulnerable information. 90 percent of the world’s data was created just within the last two years, and that data provides a wealth of insight at our fingertips, but it can also be detrimental in the wrong hands. As global trade becomes increasingly digital, the risks continue to rise. News of large-scale cybersecurity threats and cyber-attacks dominate the headlines all too often in today's information age; big-brand companies losing data, being hacked, or otherwise losing out to online hackers. As we continue to gather, process, and transmit these vast amounts of data, the need to defend and protect it becomes critically important.

  • Computer and user icon

    Learning Format Online

  • Analog clock icon

    Duration 24 weeks *

    *Duration times can vary talk to your student success coach for more information.
  • Gear or cog icon

    Total Modules 6 Modules


Program Brochure

Get the facts! Decide if this program is right for you.
Download PDF Program Brochure

Help Center | Resources

Got questions? Explore our Help Center for more info.
Find Answers Help Center | Resources