You have successfully completed the
Cyber Aware: Anatomy of a Hack course.

You now know that adversaries could infiltrate and exploit our cyber networks through inherent and/or self-imposed vulnerabilities and the security procedures you can implement to help mitigate the risk.

Join us for the other courses in this cyber series where we will further explore the threats inherent in the cyber realm and learn more about how to secure information systems and data.