Cybersecurity is the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information. It seems that everything relies on computers and the internet now—communication (e.g., email, smartphones, tablets), entertainment (e.g., interactive video games, social media, apps ), transportation (e.g., navigation systems), shopping (e.g., online shopping, credit cards), medicine (e.g., medical equipment, medical records), and the list goes on. How much of your daily life relies on technology? How much of your personal information is stored either on your own computer, smartphone, tablet or on someone else's system?

The National Cyber League (NCL) is one of several Ethical Hacking Challenges that reflect Knowledge Skills and Abilities (KSA) that are sought after by independent professionals, entrepreneurs, and Security Operations Centers (SOC) around the world. This course supports development of these KSA.

Hammer and Wrench labeled Operate and Maintain

Fundamental principles of Information Technology Security and Risk Management: Hardware software processes communications applications and policies and procedures of organizational cyber security and risk management.

NICE Framework Connections