Course Details

Previous Page


Attack Vectors and Mitigations


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
In this course, potential security breach sources such as mobile and IoT devices are explained. Cyber insurance is becoming more common as companies seek to protect their IT systems.

Target Audience
Executives or IT staff seeking to identify common threat sources and their mitigations

Prerequisites
None

Expected Duration (hours)
1.4

Lesson Objectives

Attack Vectors and Mitigations

  • start the course
  • describe how the prevalence of mobile devices has created a whole new platform for vulnerabilities
  • list the pros and cons that can arise from a BYOD environment in a workplace
  • specify how outsourcing IT can affect the overall security of a business
  • specify how more and more everyday devices becoming Internet connected can have negative effects on security
  • describe how wearables and other nontraditional platforms being connected can raise security concerns
  • recognize why TLS is becoming more prevalent and why its use is recommended
  • protect stored data with encryption
  • specify how insecure databases can lead to large data leaks
  • describe why putting data in the cloud can be useful and some ways to secure it
  • enable encryption to protect cloud data at rest
  • determine how DLP can secure digital assets
  • identify why multi-factor authentication has come into common use and its benefits
  • secure cloud user accounts with MFA
  • describe how Single Sign-On can be used to improve security
  • recognize how organizations are beginning to protect themselves from IT attacks
  • list common sources of security breaches and how to protect against them
  • Course Number:
    sp_exsd_a01_it_enus

    Expertise Level
    Beginner