YoVDO

The Cybersecurity Threat Landscape (2019)

Offered By: LinkedIn Learning

Tags

Cybersecurity Courses Ransomware Courses Malware Courses Botnets Courses DDoS Attacks Courses Phishing Courses Shadow IT Courses Cryptojacking Courses

Course Description

Overview

Learn how to protect your organization’s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors.

Syllabus

Introduction
  • Examining the cybersecurity threat landscape
  • Why examine cybersecurity threats?
1. Phishing
  • Exploring the threat of phishing
  • Protecting against phishing
2. Malware and Ransomware
  • Exploring malware and ransomware threats
  • Protecting against malware and ransomware
3. Cryptojacking
  • Exploring the threat of cryptojacking
  • Protecting against cryptojacking
4. Botnets and DDoS Attacks
  • Exploring botnets and DDoS threats
  • Protecting against botnets and DDoS threats
5. Internet of Things (IoT) Threats
  • Exploring IoT threats
  • Protecting against IoT threats
6. Cloud-Based Threats
  • Exploring cloud-computing-based threats
  • Protecting against cloud-computing-based threats
7. Shadow IT
  • Exploring the threat of shadow IT
  • Protecting against shadow IT
Conclusion
  • Next steps

Taught by

Marc Menninger

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Privacy and Security in Online Social Media
Indian Institute of Technology Delhi via Swayam
The Absolute Beginners Guide to Cyber Security 2024 - Part 1
Udemy
Offensive Security Engineering
Udemy
Cyber Security Foundations: Common Malware Attacks and Defense Strategies
EC-Council via FutureLearn