Learn how to protect your organization’s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors.
Overview
Syllabus
Introduction
- Examining the cybersecurity threat landscape
- Why examine cybersecurity threats?
- Exploring the threat of phishing
- Protecting against phishing
- Exploring malware and ransomware threats
- Protecting against malware and ransomware
- Exploring the threat of cryptojacking
- Protecting against cryptojacking
- Exploring botnets and DDoS threats
- Protecting against botnets and DDoS threats
- Exploring IoT threats
- Protecting against IoT threats
- Exploring cloud-computing-based threats
- Protecting against cloud-computing-based threats
- Exploring the threat of shadow IT
- Protecting against shadow IT
- Next steps
Taught by
Marc Menninger