Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

The Cybersecurity Threat Landscape

via LinkedIn Learning

Overview

Learn how to protect your organization’s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors.

Syllabus

Introduction
  • Examine the cybersecurity threat landscape
1. Malware and Ransomware
  • Explore the threat of malware and ransomware
  • Protect against malware and ransomware
2. Phishing and Smishing
  • Explore the threat of phishing and smishing
  • Protect against phishing and smishing
3. Business Email Compromise
  • Explore the threat of business email compromise
  • Protect against business email compromise
4. Botnets and DDoS attacks
  • Explore the threat of botnets and DDoS attacks
  • Protect against botnets and DDoS threats
5. Deepfakes
  • Explore the threat of deepfakes
  • Protect against deepfakes
6. Insider Threats
  • Explore the risk of insider threats
  • Protect against insider threats
7. Unmanaged IoT Devices
  • Explore the threat of unmanaged IoT devices
  • Protect against unmanaged IoT devices
8. Shadow IT
  • Explore the threat of shadow IT
  • Protect against shadow IT
9. Supply Chain Attacks and Third-Party Risks
  • The threat of supply chain attacks and third-party risks
  • Protect against supply chain attacks and third-party risks
Conclusion
  • Stay up to date on cybersecurity

Taught by

Marc Menninger

Reviews

Start your review of The Cybersecurity Threat Landscape

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.