How to Build Connected Services

Enroll Now

We used to think of security in terms of fences, barred windows and barricades to physical places. Then, with the rise of computers and other technologies, we began to worry about the virtual perimeter of organizations. Government information systems became more complex, and our security concerns shifted inward to the vulnerabilities of our networks.

But the reality is that security concerns haven't merely shifted; they have expanded. Today, gov agencies have to secure physical, network, and cyber systems.

In this free course we'll examine the components of an effective security strategy that addresses all necessary systems. We'll also explain how to combine those different considerations to truly secure your agency from a holistic standpoint.

Check out the course overview: