Cybersecurity Awareness: Key Security Terms & Concepts
Cybersecurity
| Beginner
- 17 videos | 2h 20m 21s
- Includes Assessment
- Earns a Badge
Everyone who connects to the Internet is vulnerable to security threats. Managers need to know the types of security threats their organizations are vulnerable to and their potential impact. In this course, you'll explore the key terms used in cybersecurity. You'll examine different types of threats, threat actors, and targets. You'll investigate advanced persistent threats (APTs), insider threats, and uncertainty in relation to cybersecurity, as well as the various types of malware and security threats
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe key concepts of cybersecurity assets and risksdescribe the key terms associated with cybersecurity threatsrecognize the key concepts of cybersecurity vulnerability and countermeasureslist the types of threat actors and their motiveslist the types of attack targetsdefine what is meant by security exposure and a security threat or risklist types of cybersecurity threatsdescribe what comprises mobile technology threats
-
define what is meant by cloud threats and list types of such threatsdefine advanced persistent threats (APTs)give an example of an APTdescribe how an insider threat in an organization would manifestdescribe what malware is and list standard types of malwarelist the steps performed in a cyber attack on securitydefine what is meant by uncertainty in cybersecuritysummarize the key concepts covered in this course
IN THIS COURSE
-
2m 26sIn this video, you will learn more about your instructor and the course. In this course, you will learn more about security, the key terms used in cybersecurity, and mobile and cloud threats. FREE ACCESS
-
7mIn this video, you will learn cybersecurity terms. These are necessary in order to pursue this learning track. This video will cover the terms asset and risk. An asset is anything that has value to an organization. A risk… FREE ACCESS
-
9m 22sIn this video, you will look at several cybersecurity terms. First, you will define threat. A threat is anything that exploits vulnerabilities or bugs in a system or application. Next, you will take a look at threat… FREE ACCESS
-
5m 20sIn this video, you will look at vulnerability. A vulnerability is a flaw or a weakness in the system. These vulnerabilities can be exploited by a threat actor. You will also learn about countermeasures. Countermeasures… FREE ACCESS
-
9m 55sIn this video, you will learn about the types of threat actors and their motives. Types of threat actors include advanced persistent threats (APTs), cybercriminals, hacktivists, and terrorists. Other threat actors include… FREE ACCESS
-
7m 27sIn this video, you will learn about the types of attack targets. Who is the target of an attack? This can be anyone on the internet, both individuals and organizations. These can be accidental or carefully selected… FREE ACCESS
-
3m 25sIn this video, you will learn what is meant by security exposure, security threat, and risk. A security threat exploits a vulnerability and causes damage. A risk is the potential that a threat will materialize and… FREE ACCESS
-
3m 41sIn this video, you will look at the types of security threats. Cybersecurity threats are categorized as internal, external, and natural. You need to understand the type of security threat you are dealing with in order to… FREE ACCESS
-
9m 16sIn this video, you will learn what makes up mobile technology threats. Mobile threats are caused by improper usage, insecure data storage, insecure communications, insecure authentication, or insufficient cryptography.… FREE ACCESS
-
9m 38sIn this video, you will learn what is meant by cloud threats. Cloud threats include management interface failure, virtual machine attacks, malicious insiders, weak authentication, inadequate infrastructure design,… FREE ACCESS
-
12m 49sIn this video, you will learn to define advanced persistent threats (APTs). Next, you will look at the characteristics of APTs. They use social engineering, they work with clear objectives, they are well-funded, and they… FREE ACCESS
-
8m 14sIn this video, you will look at examples of APTs. One of the most well known is The Equation Group, and you will look at this group in more depth. You will also explore methods for strengthening an APT defense. This… FREE ACCESS
-
16m 59sIn this video, you will look at how an insider threat might manifest. You need to understand who the insider is. The insider is any internal employee who has access to internal resources. These insider threats are… FREE ACCESS
-
13m 38sIn this video, you will learn what malware is and look at different types that exist today. Malware is malicious software. It is any software that disrupts the system or the network. Malware can cripple the… FREE ACCESS
-
11m 37sIn this video, you will learn the steps performed in a cyberattack. An attack is always conducted by a threat actor. It can be direct or through a threat vector, like malware. It is directed toward an individual or an… FREE ACCESS
-
6m 47sIn this video, you will learn what is meant by uncertainty in security. Uncertainty is simply when you are unsure. In security, a risk is uncertainty that has varied outcomes. There are three phases of uncertainty. These… FREE ACCESS
-
2m 47sIn this video, you will summarize what you've learned in the course. You've learned key terms and the types of threat actors. You also learned about attack targets and concepts of security threat risks and… FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.