The Cybersecurity Threat Landscape
Offered By: LinkedIn Learning
Course Description
Overview
Learn how to protect your organization’s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors.
Syllabus
Introduction
- Examine the cybersecurity threat landscape
- Explore the threat of malware and ransomware
- Protect against malware and ransomware
- Explore the threat of phishing and smishing
- Protect against phishing and smishing
- Explore the threat of business email compromise
- Protect against business email compromise
- Explore the threat of botnets and DDoS attacks
- Protect against botnets and DDoS threats
- Explore the threat of deepfakes
- Protect against deepfakes
- Explore the risk of insider threats
- Protect against insider threats
- Explore the threat of unmanaged IoT devices
- Protect against unmanaged IoT devices
- Explore the threat of shadow IT
- Protect against shadow IT
- The threat of supply chain attacks and third-party risks
- Protect against supply chain attacks and third-party risks
- Stay up to date on cybersecurity
Taught by
Marc Menninger
Related Courses
Academia de auditoría en la nube: independencia en la nube (Español LATAM) | Cloud Audit Academy - Cloud Agnostic (Spanish from Latin America)Amazon Web Services via AWS Skill Builder Accelerating GKE Incident Response with Prisma Cloud and Cortex XSOAR
Google via Google Cloud Skills Boost Amazon Detective Deep Dive
A Cloud Guru AWS Certified Cloud Practitioner (CLF-C01)
A Cloud Guru AWS Certified Security - Specialty 2020
A Cloud Guru