Attack Vectors & Mitigations
Beginner
- 16 Videos | 1h 12m 2s
- Includes Assessment
- Earns a Badge
Cyber insurance is becoming more common as companies seek to protect their IT systems. During this course, you will explore potential security breach sources such as mobile and IoT devices. Topics include the pros and cons of workplace Bring Your Own Device (BYOD) policies; the risks of outsourcing your IT; how internet-connected devices, including wearable gadgets, may present security risks. You will also discover how Transport Layer Security (TLS) plays a key role, and learn how to protect stored data with encryption, such as BitLocker. As you progress through the course, you will explore how insecure databases can leak data; and learn how to evaluate cloud data security options, Data Loss Prevention (DLP), Multi-factor Authentication (MFA), cloud MFA, Single Sign-On (SSO), Identity Federation, and cyber insurance. You will conclude by listing common sources of security breaches and how to protect against them.
WHAT YOU WILL LEARN
-
describe how the prevalence of mobile devices has created a whole new platform for vulnerabilitieslist the pros and cons that can arise from a BYOD environment in a workplacespecify how outsourcing IT can affect the overall security of a businessspecify how more and more everyday devices becoming Internet connected can have negative effects on securitydescribe how wearables and other nontraditional platforms being connected can raise security concernsrecognize why TLS is becoming more prevalent and why its use is recommendedprotect stored data with encryptionspecify how insecure databases can lead to large data leaks
-
describe why putting data in the cloud can be useful and some ways to secure itenable encryption to protect cloud data at restdetermine how DLP can secure digital assetsidentify why multi-factor authentication has come into common use and its benefitssecure cloud user accounts with MFAdescribe how Single Sign-On can be used to improve securityrecognize how organizations are beginning to protect themselves from IT attackslist common sources of security breaches and how to protect against them
IN THIS COURSE
-
1.Mobile Devices and Malware5m 36sUP NEXT
-
2.BYOD And Business3m 27s
-
3.Outsourced IT5m 37s
-
4.Smart Appliances and IoT devices4m 4s
-
5.Wearables and Vulnerabilities4m 2s
-
6.TLS6m
-
7.Use BitLocker to Protect Data at Rest3m 57s
-
8.Data at Rest3m 9s
-
9.Securing Data in the Cloud5m 50s
-
10.Encrypting Cloud Data3m 31s
-
11.Data Loss Prevention (DLP)6m 49s
-
12.Multi-factor Authentication (MFA)3m 1s
-
13.Enable Cloud Multi-factor Authentication4m 14s
-
14.Single Sign-On and Identity Federation5m 27s
-
15.Cyber Insurance2m 3s
-
16.Exercise: Threat Identification5m 18s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.