Mitigating Security Risks: Cyber Security Risks

IT Security    |    Intermediate
  • 13 Videos | 1h 22m 6s
  • Includes Assessment
  • Earns a Badge
Effective cybersecurity risk management requires intricate knowledge of day-to-day IT security risks, network vulnerabilities, and cyber attacks. In this course, you'll detail several cybersecurity breaches and how best to prevent each one. You'll start with a general overview of what comprises security risks before categorizing different types into information, cloud, and data-related risks. Next, you'll explore cybercrime methods, the motivations behind them, and the security gaps that invite them in. You'll then use real-life examples to detail some commonplace cyberattacks and crimes. Moving on, you'll investigate what's meant by malware and outline best practices to manage worms, viruses, logic bombs, trojans, and rootkits. You'll also learn how to safeguard against malware, spyware, ransomware, adware, phishing, zero-day vulnerabilities, DoS, and backdoor attacks. By the end of the course, you'll be able to outline guidelines and best practices for securing against the most prevalent types of cybercrimes.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    define what is meant by a security risk in relation to information technology
    list potential information and data security risks
    list potentional cloud security risks
    describe common sources of cybercrimes, their targets, and how to use these to identify effective prevention methods
    recognize common cyber attacks and crimes using examples
    list the best practices to manage threats from worms, viruses, logic bombs, trojans, and rootkits
  • describe ways to thwart various attacks, including DoS
    describe methods to handle backdoor attacks
    describe the role of zero-day exploits in exploiting vulnerabilities
    list examples of zero-day attacks
    describe methods to handle zero-day vulnerabilities
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 37s
    UP NEXT
  • Playable
    2. 
    The Core Facets of Security Risks
    4m 45s
  • Locked
    3. 
    Information and Data Security Risks
    9m 1s
  • Locked
    4. 
    Cloud Security Risks
    8m 3s
  • Locked
    5. 
    Sources of Cybercrimes and Attacks
    6m 33s
  • Locked
    6. 
    Examples of Cyber Attacks and Crimes
    5m 34s
  • Locked
    7. 
    Malware Handling Best Practices
    7m 59s
  • Locked
    8. 
    Handling DoS and DDoS Attacks
    8m 48s
  • Locked
    9. 
    Handling Backdoor Attacks
    7m 29s
  • Locked
    10. 
    The Role of Zero-Day (0day) Exploits
    7m 10s
  • Locked
    11. 
    Key Examples of Zero-Day Attacks
    3m 43s
  • Locked
    12. 
    Handling Zero-Day Vulnerabilities
    4m 39s
  • Locked
    13. 
    Course Summary
    1m 16s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.