Find a university to explore its courses and reviews.
Introduction to information assurance covering threats, hacker methods, viruses, worms, system vulnerabilities, and cryptography basics including hash functions and public key cryptography.
No one has reviewed this course yet. Share your experience and help future students know what to expect.
Takes about 2 minutes. Every review is anonymous — no account needed.