Inside the Breach
Offered By: LinkedIn Learning
Course Description
Overview
Discover the inside story on headline-making, high-profile cybersecurity breaches, and find out how to protect your organization against similar attacks.
Syllabus
Introduction
- Inside the breach
- The Equifax breach
- Inside the Equifax breach
- Lesson 1: Patch and vulnerability management
- Lesson 2: Move quickly!
- Lesson 3: Implement an incident response plan
- Aftermath of the Equifax breach
- The Target breach
- Inside the Target breach
- Lesson 1: Vendor management
- Lesson 2: Network segmentation
- Lesson 3: Log monitoring
- Aftermath of the Target breach
- The Veterans Affairs (VA) breach
- Inside the VA breach
- Lesson 1: Standardize incident escalation and notification
- Lesson 2: Encryption is essential
- Lesson 3: Security policy
- Aftermath of the VA breach
- The Atlanta ransomware breach
- Inside the Atlanta ransomware breach
- Lesson 1: Perform regular backups
- Lesson 2: Consider ransom demands
- Lesson 3: Maintain malware prevention
- Aftermath of the Atlanta ransomware breach
- The TJX breach
- Inside the TJX breach
- Lesson 1: Control physical access
- Lesson 2: Secure wireless networks
- Lesson 3: Limit data retention
- Aftermath of the TJX breach
- The Bowman Dam breach
- Inside the Bowman Dam breach
- Lesson 1: Secure the Internet of Things
- Lesson 2: Segment SCADA networks
- Lesson 3: Control removable media
- Aftermath of the Bowman Dam breach
- The state-sponsored university breach
- Inside the state-sponsored university breach
- Lesson 1: Multifactor authentication
- Lesson 2: Understand advanced persistent threats
- Lesson 3: Social engineering
- After the state-sponsored university breach
- The Maersk breach
- Inside the Maersk breach
- Lesson 1: Protect admin accounts
- Lesson 2: Apply patches promptly
- Lesson 3: Test backups
- After the Maersk breach
- The Sony breach
- Inside the Sony breach
- Lesson 1: Defense in depth
- Lesson 2: Offense is risky
- Lesson 3: Authentication
- After the Sony breach
Taught by
Mike Chapple
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network