YoVDO

Inside the Breach

Offered By: LinkedIn Learning

Tags

Cybersecurity Courses Social Engineering Courses Encryption Courses Risk Assessment Courses Data Encryption Courses Security Policies Courses Network Segmentation Courses

Course Description

Overview

Discover the inside story on headline-making, high-profile cybersecurity breaches, and find out how to protect your organization against similar attacks.

Syllabus

Introduction
  • Inside the breach
The 2017 Equifax Breach
  • The Equifax breach
  • Inside the Equifax breach
  • Lesson 1: Patch and vulnerability management
  • Lesson 2: Move quickly!
  • Lesson 3: Implement an incident response plan
  • Aftermath of the Equifax breach
The 2013 Target Breach
  • The Target breach
  • Inside the Target breach
  • Lesson 1: Vendor management
  • Lesson 2: Network segmentation
  • Lesson 3: Log monitoring
  • Aftermath of the Target breach
The 2006 VA Laptop Theft
  • The Veterans Affairs (VA) breach
  • Inside the VA breach
  • Lesson 1: Standardize incident escalation and notification
  • Lesson 2: Encryption is essential
  • Lesson 3: Security policy
  • Aftermath of the VA breach
The 2018 Atlanta Ransomware Breach
  • The Atlanta ransomware breach
  • Inside the Atlanta ransomware breach
  • Lesson 1: Perform regular backups
  • Lesson 2: Consider ransom demands
  • Lesson 3: Maintain malware prevention
  • Aftermath of the Atlanta ransomware breach
The 2005 TJX Breach
  • The TJX breach
  • Inside the TJX breach
  • Lesson 1: Control physical access
  • Lesson 2: Secure wireless networks
  • Lesson 3: Limit data retention
  • Aftermath of the TJX breach
The 2013 Bowman Dam Breach
  • The Bowman Dam breach
  • Inside the Bowman Dam breach
  • Lesson 1: Secure the Internet of Things
  • Lesson 2: Segment SCADA networks
  • Lesson 3: Control removable media
  • Aftermath of the Bowman Dam breach
The State-Sponsored University Breach
  • The state-sponsored university breach
  • Inside the state-sponsored university breach
  • Lesson 1: Multifactor authentication
  • Lesson 2: Understand advanced persistent threats
  • Lesson 3: Social engineering
  • After the state-sponsored university breach
The Maersk Breach
  • The Maersk breach
  • Inside the Maersk breach
  • Lesson 1: Protect admin accounts
  • Lesson 2: Apply patches promptly
  • Lesson 3: Test backups
  • After the Maersk breach
The Sony Breach
  • The Sony breach
  • Inside the Sony breach
  • Lesson 1: Defense in depth
  • Lesson 2: Offense is risky
  • Lesson 3: Authentication
  • After the Sony breach

Taught by

Mike Chapple

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera