The Cybersecurity Threat Landscape
Offered By: LinkedIn Learning
Course Description
Overview
Learn how to protect your organization’s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors.
Syllabus
Introduction
- Examine the cybersecurity threat landscape
- Explore the threat of malware and ransomware
- Protect against malware and ransomware
- Explore the threat of phishing and smishing
- Protect against phishing and smishing
- Explore the threat of business email compromise
- Protect against business email compromise
- Explore the threat of botnets and DDoS attacks
- Protect against botnets and DDoS threats
- Explore the threat of deepfakes
- Protect against deepfakes
- Explore the risk of insider threats
- Protect against insider threats
- Explore the threat of unmanaged IoT devices
- Protect against unmanaged IoT devices
- Explore the threat of shadow IT
- Protect against shadow IT
- The threat of supply chain attacks and third-party risks
- Protect against supply chain attacks and third-party risks
- Stay up to date on cybersecurity
Taught by
Marc Menninger
Related Courses
Architecting Microsoft Azure SolutionsMicrosoft via edX Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam Network Security
Georgia Institute of Technology via Udacity Microsoft Professional Orientation : Cloud Administration
Microsoft via edX Cyber Threats and Attack Vectors
University of Colorado System via Coursera