The Cybersecurity Threat Landscape
Offered By: LinkedIn Learning
Course Description
Overview
Learn how to protect your organization’s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors.
Syllabus
Introduction
- Examine the cybersecurity threat landscape
- Explore the threat of malware and ransomware
- Protect against malware and ransomware
- Explore the threat of phishing and smishing
- Protect against phishing and smishing
- Explore the threat of business email compromise
- Protect against business email compromise
- Explore the threat of botnets and DDoS attacks
- Protect against botnets and DDoS threats
- Explore the threat of deepfakes
- Protect against deepfakes
- Explore the risk of insider threats
- Protect against insider threats
- Explore the threat of unmanaged IoT devices
- Protect against unmanaged IoT devices
- Explore the threat of shadow IT
- Protect against shadow IT
- The threat of supply chain attacks and third-party risks
- Protect against supply chain attacks and third-party risks
- Stay up to date on cybersecurity
Taught by
Marc Menninger
Related Courses
Artificial Intelligence for CybersecurityLinkedIn Learning Assessing Red Team Post Exploitation Activity
Pluralsight Incident Response and Advanced Forensics
Cybrary 5 Power-Ups for Your Insider Threat Program
Cybrary ECIH Cert Prep: Certified Incident Handler v2 (212-89)
LinkedIn Learning