Skip to main content

Introduction to cyber security

Zoomed in shot of a computer screen with what looks like encrypted text.

 2.1 Setting up a PGP email client