An Executive's Guide to Security: Understanding Security Threats

Cybersecurity    |    Beginner
  • 13 Videos | 50m 13s
  • Includes Assessment
  • Earns a Badge
Likes 240 Likes 240
Companies that do not understand threats facing their information are at risk of costly data breaches. In this 13-video course, learners can explore common security threats, types of network attacks, and the human element of security threats. Key concepts covered here include what an attack surface is, and how it must be understood to protect corporate information; and what network hardening is and how it relates to protection of corporate information. Next, learners will examine network demilitarized zones and how they protect corporate information; observe differences between threats, vulnerabilities, and risks in corporate environments; and study top kinds of security threats facing organizations today. Continue by learning the role that physical security plays in protecting corporate data; how social engineering is conducted and how it is mitigated through corporate policy; and the importance of corporate security policies, and why they should be strictly adhered to. Finally, explore the importance of password policies and why they should be adhered to; and learn reasons why IT administrators need to protect an organization by refusing to bend rules.

WHAT YOU WILL LEARN

  • describe what an attack surface is and how it must be understood in order to protect corporate information
    specify what network hardening is and how it relates to the protection of corporate information
    discuss network demilitarized zones and how they help protect corporate information
    describe the differences between threats, vulnerabilities, and risks in a corporate environment
    specify the top kinds of security threats facing organizations today
    discuss the common types of security attacks and how they each pose a risk to organizational data
  • describe the role physical security plays in the protection of corporate data
    specify how social engineering is conducted and how it can be mitigated through corporate policy
    discuss the importance of corporate security policies and why they should be strictly adhered to
    describe the importance of password policies and why they should be adhered to
    specify the reasons why IT administrators need to protect an organization by refusing to bend the rules
    describe security threats, network hacks and attacks, and the human element in protecting organizational information

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 9s
    UP NEXT
  • Playable
    2. 
    Understanding the Attack Surface
    4m 21s
  • Locked
    3. 
    Network Hardening Explained
    6m 40s
  • Locked
    4. 
    What is a Demilitarized Zone?
    3m 41s
  • Locked
    5. 
    Threats vs. Vulnerabilities vs. Risks
    3m 26s
  • Locked
    6. 
    Top Security Threats
    2m 56s
  • Locked
    7. 
    Types of Attacks
    6m 31s
  • Locked
    8. 
    Physical Security
    2m 44s
  • Locked
    9. 
    Social Engineering
    2m 54s
  • Locked
    10. 
    The Importance of the Corporate Security Policy
    2m 32s
  • Locked
    11. 
    Password Protection Policies
    2m 21s
  • Locked
    12. 
    Why Never to Ask an Admin for Favors
    3m 25s
  • Locked
    13. 
    Exercise: Describe Security Threats
    2m 3s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 26 Likes 26  
Likes 9 Likes 9  
Likes 22 Likes 22  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 22 Likes 22  
Likes 463 Likes 463