What would you do in the face of an actual information security problem? This program consists of six cyber security modules with real life scenarios and case studies. Each of the modules in this bundle helps refine and enhance the skills that cyber security and IT professionals need. The six modules included are: • Access Control and Identity Management introduces the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. • Application, Data, and Host Security covers the security of applications, data, and hosts in information systems. • Compliance and Operational Security contains a discussion of the role of security governance and risk management in information security.