An Executive's Guide to Security: Understanding Security Threats

Cybersecurity    |    Beginner
  • 13 videos | 44m 43s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 1991 users Rating 4.6 of 1991 users (1991)
Companies that do not understand threats facing their information are at risk of costly data breaches. In this 13-video course, learners can explore common security threats, types of network attacks, and the human element of security threats. Key concepts covered here include what an attack surface is, and how it must be understood to protect corporate information; and what network hardening is and how it relates to protection of corporate information. Next, learners will examine network demilitarized zones and how they protect corporate information; observe differences between threats, vulnerabilities, and risks in corporate environments; and study top kinds of security threats facing organizations today. Continue by learning the role that physical security plays in protecting corporate data; how social engineering is conducted and how it is mitigated through corporate policy; and the importance of corporate security policies, and why they should be strictly adhered to. Finally, explore the importance of password policies and why they should be adhered to; and learn reasons why IT administrators need to protect an organization by refusing to bend rules.

WHAT YOU WILL LEARN

  • Describe what an attack surface is and how it must be understood in order to protect corporate information
    Specify what network hardening is and how it relates to the protection of corporate information
    Discuss network demilitarized zones and how they help protect corporate information
    Describe the differences between threats, vulnerabilities, and risks in a corporate environment
    Specify the top kinds of security threats facing organizations today
    Discuss the common types of security attacks and how they each pose a risk to organizational data
  • Describe the role physical security plays in the protection of corporate data
    Specify how social engineering is conducted and how it can be mitigated through corporate policy
    Discuss the importance of corporate security policies and why they should be strictly adhered to
    Describe the importance of password policies and why they should be adhered to
    Specify the reasons why it administrators need to protect an organization by refusing to bend the rules
    Describe security threats, network hacks and attacks, and the human element in protecting organizational information

IN THIS COURSE

  • 1m 9s
  • 4m 21s
    Upon completion of this video, you will be able to describe what an attack surface is and how it must be understood in order to protect corporate information. FREE ACCESS
  • Locked
    3.  Network Hardening Explained
    6m 40s
    After completing this video, you will be able to specify what network hardening is and how it relates to the protection of corporate information. FREE ACCESS
  • Locked
    4.  What is a Demilitarized Zone?
    3m 41s
    In this video, you will discuss network demilitarized zones and how they help protect corporate information. FREE ACCESS
  • Locked
    5.  Threats vs. Vulnerabilities vs. Risks
    3m 26s
    After completing this video, you will be able to describe the differences between threats, vulnerabilities, and risks in a corporate environment. FREE ACCESS
  • Locked
    6.  Top Security Threats
    2m 56s
    After completing this video, you will be able to specify the most common types of security threats facing organizations today. FREE ACCESS
  • Locked
    7.  Types of Attacks
    6m 31s
    In this video, you will discuss the common types of security attacks and how they each pose a risk to organizational data. FREE ACCESS
  • Locked
    8.  Physical Security
    2m 44s
    After completing this video, you will be able to describe the role physical security plays in protecting corporate data. FREE ACCESS
  • Locked
    9.  Social Engineering
    2m 54s
    After completing this video, you will be able to specify how social engineering is conducted and how it can be mitigated through corporate policy. FREE ACCESS
  • Locked
    10.  The Importance of the Corporate Security Policy
    2m 32s
    During this video, you will learn how to discuss the importance of corporate security policies and why it is important to follow them closely. FREE ACCESS
  • Locked
    11.  Password Protection Policies
    2m 21s
    After completing this video, you will be able to describe the importance of password policies and why you should adhere to them. FREE ACCESS
  • Locked
    12.  Why Never to Ask an Admin for Favors
    3m 25s
    After completing this video, you will be able to specify the reasons why IT administrators need to protect an organization by refusing to break the rules. FREE ACCESS
  • Locked
    13.  Exercise: Describe Security Threats
    2m 3s
    Upon completion of this video, you will be able to describe security threats, network hacks and attacks, and the human element in protecting organizational information. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 2165 users Rating 4.6 of 2165 users (2165)
Rating 4.6 of 129 users Rating 4.6 of 129 users (129)
Rating 4.6 of 1774 users Rating 4.6 of 1774 users (1774)