Cybersecurity Awareness: Key Security Terms & Concepts

Cybersecurity    |    Beginner
  • 17 videos | 2h 20m 21s
  • Includes Assessment
  • Earns a Badge
Likes 60 Likes 60
Everyone who connects to the Internet is vulnerable to security threats. Managers need to know the types of security threats their organizations are vulnerable to and their potential impact. In this course, you'll explore the key terms used in cybersecurity. You'll examine different types of threats, threat actors, and targets. You'll investigate advanced persistent threats (APTs), insider threats, and uncertainty in relation to cybersecurity, as well as the various types of malware and security threats

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe key concepts of cybersecurity assets and risks
    describe the key terms associated with cybersecurity threats
    recognize the key concepts of cybersecurity vulnerability and countermeasures
    list the types of threat actors and their motives
    list the types of attack targets
    define what is meant by security exposure and a security threat or risk
    list types of cybersecurity threats
    describe what comprises mobile technology threats
  • define what is meant by cloud threats and list types of such threats
    define advanced persistent threats (APTs)
    give an example of an APT
    describe how an insider threat in an organization would manifest
    describe what malware is and list standard types of malware
    list the steps performed in a cyber attack on security
    define what is meant by uncertainty in cybersecurity
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1.  Course Overview
    2m 26s
    In this video, you will learn more about your instructor and the course. In this course, you will learn more about security, the key terms used in cybersecurity, and mobile and cloud threats.  FREE ACCESS
  • Playable
    2.  Cybersecurity Assets and Risks
    7m
    In this video, you will learn cybersecurity terms. These are necessary in order to pursue this learning track. This video will cover the terms asset and risk. An asset is anything that has value to an organization. A risk… FREE ACCESS
  • Locked
    3.  Cybersecurity Threats
    9m 22s
    In this video, you will look at several cybersecurity terms. First, you will define threat. A threat is anything that exploits vulnerabilities or bugs in a system or application. Next, you will take a look at threat… FREE ACCESS
  • Locked
    4.  Cybersecurity Vulnerability and Countermeasures
    5m 20s
    In this video, you will look at vulnerability. A vulnerability is a flaw or a weakness in the system. These vulnerabilities can be exploited by a threat actor. You will also learn about countermeasures. Countermeasures… FREE ACCESS
  • Locked
    5.  Types of Threat Actors in Cybersecurity
    9m 55s
    In this video, you will learn about the types of threat actors and their motives. Types of threat actors include advanced persistent threats (APTs), cybercriminals, hacktivists, and terrorists. Other threat actors include… FREE ACCESS
  • Locked
    6.  Types of Attack Targets in Cybersecurity
    7m 27s
    In this video, you will learn about the types of attack targets. Who is the target of an attack? This can be anyone on the internet, both individuals and organizations. These can be accidental or carefully selected… FREE ACCESS
  • Locked
    7.  Security Threat, Risk, and Exposure
    3m 25s
    In this video, you will learn what is meant by security exposure, security threat, and risk.  A security threat exploits a vulnerability and causes damage. A risk is the potential that a threat will materialize and… FREE ACCESS
  • Locked
    8.  Types of Security Threats
    3m 41s
    In this video, you will look at the types of security threats. Cybersecurity threats are categorized as internal, external, and natural.  You need to understand the type of security threat you are dealing with in order to… FREE ACCESS
  • Locked
    9.  Mobile Technology Threats
    9m 16s
    In this video, you will learn what makes up mobile technology threats. Mobile threats are caused by improper usage, insecure data storage, insecure communications, insecure authentication, or insufficient cryptography.… FREE ACCESS
  • Locked
    10.  Cloud Threat Definition and Types
    9m 38s
    In this video, you will learn what is meant by cloud threats. Cloud threats include management interface failure, virtual machine attacks, malicious insiders, weak authentication, inadequate infrastructure design,… FREE ACCESS
  • Locked
    11.  Defining Advanced Persistent Threats (APTs)
    12m 49s
    In this video, you will learn to define advanced persistent threats (APTs). Next, you will look at the characteristics of APTs. They use social engineering, they work with clear objectives, they are well-funded, and they… FREE ACCESS
  • Locked
    12.  Examples of Advanced Persistent Threats (APTs)
    8m 14s
    In this video, you will look at examples of APTs. One of the most well known is The Equation Group, and you will look at this group in more depth. You will also explore methods for strengthening an APT defense. This… FREE ACCESS
  • Locked
    13.  Insider Threat in an Organization
    16m 59s
    In this video, you will look at how an insider threat might manifest. You need to understand who the insider is. The insider is any internal employee who has access to internal resources. These insider threats are… FREE ACCESS
  • Locked
    14.  Malware Definition and Types
    13m 38s
    In this video, you will learn what malware is and look at different types that exist today. Malware is malicious software. It is any software that disrupts the system or the network. Malware can cripple the… FREE ACCESS
  • Locked
    15.  Steps in a Security Attack
    11m 37s
    In this video, you will learn the steps performed in a cyberattack. An attack is always conducted by a threat actor. It can be direct or through a threat vector, like malware. It is directed toward an individual or an… FREE ACCESS
  • Locked
    16.  Defining Uncertainty in Security
    6m 47s
    In this video, you will learn what is meant by uncertainty in security. Uncertainty is simply when you are unsure. In security, a risk is uncertainty that has varied outcomes. There are three phases of uncertainty. These… FREE ACCESS
  • Locked
    17.  Course Summary
    2m 47s
    In this video, you will summarize what you've learned in the course. You've learned key terms and the types of threat actors. You also learned about attack targets and concepts of security threat risks and… FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 220 Likes 220  
Likes 1788 Likes 1788