An Executive's Guide to Security: Understanding Security Threats
Cybersecurity
| Beginner
- 13 videos | 44m 43s
- Includes Assessment
- Earns a Badge
Companies that do not understand threats facing their information are at risk of costly data breaches. In this 13-video course, learners can explore common security threats, types of network attacks, and the human element of security threats. Key concepts covered here include what an attack surface is, and how it must be understood to protect corporate information; and what network hardening is and how it relates to protection of corporate information. Next, learners will examine network demilitarized zones and how they protect corporate information; observe differences between threats, vulnerabilities, and risks in corporate environments; and study top kinds of security threats facing organizations today. Continue by learning the role that physical security plays in protecting corporate data; how social engineering is conducted and how it is mitigated through corporate policy; and the importance of corporate security policies, and why they should be strictly adhered to. Finally, explore the importance of password policies and why they should be adhered to; and learn reasons why IT administrators need to protect an organization by refusing to bend rules.
WHAT YOU WILL LEARN
-
describe what an attack surface is and how it must be understood in order to protect corporate informationspecify what network hardening is and how it relates to the protection of corporate informationdiscuss network demilitarized zones and how they help protect corporate informationdescribe the differences between threats, vulnerabilities, and risks in a corporate environmentspecify the top kinds of security threats facing organizations todaydiscuss the common types of security attacks and how they each pose a risk to organizational data
-
describe the role physical security plays in the protection of corporate dataspecify how social engineering is conducted and how it can be mitigated through corporate policydiscuss the importance of corporate security policies and why they should be strictly adhered todescribe the importance of password policies and why they should be adhered tospecify the reasons why IT administrators need to protect an organization by refusing to bend the rulesdescribe security threats, network hacks and attacks, and the human element in protecting organizational information
IN THIS COURSE
-
1m 9s
-
4m 21s
-
6m 40s
-
3m 41s
-
3m 26s
-
2m 56s
-
6m 31s
-
2m 44s
-
2m 54s
-
2m 32s
-
2m 21s
-
3m 25s
-
2m 3s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.