Inside the Breach
Offered By: LinkedIn Learning
Course Description
Overview
Discover the inside story on headline-making, high-profile cybersecurity breaches, and find out how to protect your organization against similar attacks.
Syllabus
Introduction
- Inside the breach
- The Equifax breach
- Inside the Equifax breach
- Lesson 1: Patch and vulnerability management
- Lesson 2: Move quickly!
- Lesson 3: Implement an incident response plan
- Aftermath of the Equifax breach
- The Target breach
- Inside the Target breach
- Lesson 1: Vendor management
- Lesson 2: Network segmentation
- Lesson 3: Log monitoring
- Aftermath of the Target breach
- The Veterans Affairs (VA) breach
- Inside the VA breach
- Lesson 1: Standardize incident escalation and notification
- Lesson 2: Encryption is essential
- Lesson 3: Security policy
- Aftermath of the VA breach
- The Atlanta ransomware breach
- Inside the Atlanta ransomware breach
- Lesson 1: Perform regular backups
- Lesson 2: Consider ransom demands
- Lesson 3: Maintain malware prevention
- Aftermath of the Atlanta ransomware breach
- The TJX breach
- Inside the TJX breach
- Lesson 1: Control physical access
- Lesson 2: Secure wireless networks
- Lesson 3: Limit data retention
- Aftermath of the TJX breach
- The Bowman Dam breach
- Inside the Bowman Dam breach
- Lesson 1: Secure the Internet of Things
- Lesson 2: Segment SCADA networks
- Lesson 3: Control removable media
- Aftermath of the Bowman Dam breach
- The state-sponsored university breach
- Inside the state-sponsored university breach
- Lesson 1: Multifactor authentication
- Lesson 2: Understand advanced persistent threats
- Lesson 3: Social engineering
- After the state-sponsored university breach
- The Maersk breach
- Inside the Maersk breach
- Lesson 1: Protect admin accounts
- Lesson 2: Apply patches promptly
- Lesson 3: Test backups
- After the Maersk breach
- The Sony breach
- Inside the Sony breach
- Lesson 1: Defense in depth
- Lesson 2: Offense is risky
- Lesson 3: Authentication
- After the Sony breach
Taught by
Mike Chapple
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera