Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

The Cybersecurity Threat Landscape

Description

Learn how to protect your organization’s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors.

As IT systems continue to grow in complexity, cybersecurity threats are becoming increasingly more effective and damaging. News headlines regularly announce enormous data breaches and sophisticated hacks. How are these attackers getting in, and what actions can you take to protect against them? In this course, Marc Menninger describes some of the most common cybersecurity threats, including phishing and ransomware, as well as newer attack vectors like cryptojacking, cloud-based threats, and unsecured Internet of Things (IoT) devices. He then teaches the best countermeasures for reducing or eliminating the impact of these threats.

Tags

Syllabus

Introduction
  • Examining the cybersecurity threat landscape
  • Why examine cybersecurity threats?
1. Phishing
  • Exploring the threat of phishing
  • Protecting against phishing
2. Malware and Ransomware
  • Exploring malware and ransomware threats
  • Protecting against malware and ransomware
3. Cryptojacking
  • Exploring the threat of cryptojacking
  • Protecting against cryptojacking
4. Botnets and DDoS Attacks
  • Exploring botnets and DDoS threats
  • Protecting against botnets and DDoS threats
5. Internet of Things (IoT) Threats
  • Exploring IoT threats
  • Protecting against IoT threats
6. Cloud-Based Threats
  • Exploring cloud-computing-based threats
  • Protecting against cloud-computing-based threats
7. Shadow IT
  • Exploring the threat of shadow IT
  • Protecting against shadow IT
Conclusion
  • Next steps

Online Course


The Cybersecurity Threat Landscape

Affiliate notice

Learn how to protect your organization’s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors.

As IT systems continue to grow in complexity, cybersecurity threats are becoming increasingly more effective and damaging. News headlines regularly announce enormous data breaches and sophisticated hacks. How are these attackers getting in, and what actions can you take to protect against them? In this course, Marc Menninger describes some of the most common cybersecurity threats, including phishing and ransomware, as well as newer attack vectors like cryptojacking, cloud-based threats, and unsecured Internet of Things (IoT) devices. He then teaches the best countermeasures for reducing or eliminating the impact of these threats.

Introduction
  • Examining the cybersecurity threat landscape
  • Why examine cybersecurity threats?
1. Phishing
  • Exploring the threat of phishing
  • Protecting against phishing
2. Malware and Ransomware
  • Exploring malware and ransomware threats
  • Protecting against malware and ransomware
3. Cryptojacking
  • Exploring the threat of cryptojacking
  • Protecting against cryptojacking
4. Botnets and DDoS Attacks
  • Exploring botnets and DDoS threats
  • Protecting against botnets and DDoS threats
5. Internet of Things (IoT) Threats
  • Exploring IoT threats
  • Protecting against IoT threats
6. Cloud-Based Threats
  • Exploring cloud-computing-based threats
  • Protecting against cloud-computing-based threats
7. Shadow IT
  • Exploring the threat of shadow IT
  • Protecting against shadow IT
Conclusion
  • Next steps