The Cybersecurity Threat Landscape (2019)
Offered By: LinkedIn Learning
Course Description
Overview
Learn how to protect your organization’s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors.
Syllabus
Introduction
- Examining the cybersecurity threat landscape
- Why examine cybersecurity threats?
- Exploring the threat of phishing
- Protecting against phishing
- Exploring malware and ransomware threats
- Protecting against malware and ransomware
- Exploring the threat of cryptojacking
- Protecting against cryptojacking
- Exploring botnets and DDoS threats
- Protecting against botnets and DDoS threats
- Exploring IoT threats
- Protecting against IoT threats
- Exploring cloud-computing-based threats
- Protecting against cloud-computing-based threats
- Exploring the threat of shadow IT
- Protecting against shadow IT
- Next steps
Taught by
Marc Menninger
Related Courses
The Cybersecurity Threat LandscapeLinkedIn Learning Botnets for Mining Cryptocurrencies - Renita Murimi
CAE in Cybersecurity Community via YouTube Minesweeper - An In-Depth Look into Drive-By Cryptocurrency Mining and Its Defense
Association for Computing Machinery (ACM) via YouTube TeamTNT - Explosive Cryptomining
Black Hat via YouTube Ransom - A Real-World Case Study in Data Theft, Forensics and the Law
RSA Conference via YouTube