Understand the current state of cybersecurity
Outline the foundations of cybersecurity
Identify the various types of threats that can harm an organization
Recognize a range of security responses that can be used against violations
Identify the role of IT security in risk management