Learn how to protect your organization’s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors.
Overview
Syllabus
Introduction
- Examine the cybersecurity threat landscape
- Explore the threat of malware and ransomware
- Protect against malware and ransomware
- Explore the threat of phishing and smishing
- Protect against phishing and smishing
- Explore the threat of business email compromise
- Protect against business email compromise
- Explore the threat of botnets and DDoS attacks
- Protect against botnets and DDoS threats
- Explore the threat of deepfakes
- Protect against deepfakes
- Explore the risk of insider threats
- Protect against insider threats
- Explore the threat of unmanaged IoT devices
- Protect against unmanaged IoT devices
- Explore the threat of shadow IT
- Protect against shadow IT
- The threat of supply chain attacks and third-party risks
- Protect against supply chain attacks and third-party risks
- Stay up to date on cybersecurity
Taught by
Marc Menninger