In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it. After completing this course, a learner will be able to: ?\tDefine key concepts and terminology in Cybersecurity ?\tIdentify threats to cybersecurity ?\tIdentify strategies to identify and remediate vulnerabilities in information assets ?\tIdentify the systemic components (including personnel) necessary for an effective cybersecurity program