Learn how to protect your organization’s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors.
Overview
Syllabus
Introduction
- Examine the cybersecurity threat landscape
- Explore the threat of malware and ransomware
- Protect against malware and ransomware
- Explore the threat of phishing and smishing
- Protect against phishing and smishing
- Explore the threat of business email compromise
- Protect against business email compromise
- Explore the threat of botnets and DDoS attacks
- Protect against botnets and DDoS threats
- Exploring the threat of zero-day attacks
- Mitigating zero-day attacks
- Exploring the threat of AI-based cyberattacks
- Protecting against AI-based cyberattacks
- Exploring the threat of advanced persistent threats (APTs)
- Protecting against advanced persistent threats (APTs)
- Explore the risk of insider threats
- Protect against insider threats
- Explore the threat of unmanaged IoT devices
- Protect against unmanaged IoT devices
- Explore the threat of shadow IT
- Protect against shadow IT
- The threat of supply chain attacks and third-party risks
- Protect against supply chain attacks and third-party risks
- Stay up to date on cybersecurity
Taught by
Marc Menninger