Learn how to foster engagement and establish a sense of purpose in your employees by creating a culture of learning.
Overview
Syllabus
Introduction
- Threats, vulnerabilities, and mitigations
- Vulnerability impact
- Supply chain vulnerabilities
- Configuration vulnerabilities
- Architectural vulnerabilities
- Comparing viruses, worms, and trojans
- Malware payloads
- Understanding backdoors and logic bombs
- Looking at advanced malware
- Understanding botnets
- Malicious script execution
- Cybersecurity adversaries
- Attacker motivations
- Preventing insider threats
- Attack vectors
- Zero-day attacks
- Social engineering
- Impersonation attacks
- Identity fraud and pretexting
- Watering hole attacks
- Physical social engineering
- Business email compromise
- Misinformation and disinformation
- Password attacks
- Password spraying and credential stuffing
- Preventing SQL injection
- Understanding cross-site scripting
- Request forgery
- Overflow attacks
- Explaining cookies and attachments
- Session hijacking
- Code execution attacks
- Privilege escalation
- OWASP Top Ten
- Application security
- Defending against directory traversal
- Race condition vulnerabilities
- Brute force attacks
- Knowledge-based attacks
- Limitations of encryption algorithms
- Denial-of-service attacks
- Eavesdropping attacks
- DNS attacks
- Wireless attacks
- Propagation attacks
- Preventing rogues and evil twins
- Disassociation attacks
- Understanding Bluetooth attacks
- RFID security
- Attack indicators
- Continuing your studies
Taught by
Mike Chapple