Trends in Cybersecurity

Cybersecurity    |    Beginner
  • 18 videos | 45m 34s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 419 users Rating 4.6 of 419 users (419)
Cybersecurity is the practice of protecting systems, networks, and programs from cyber threats and exploits. Therefore, organizations are required to allocate a growing number of resources to protect their data from unwanted and unauthorized data breaches and disclosures. In this course, you'll explore the possible constraints that may prevent an organization from having an ideal IT security solution including budget, regulations, design limitations, and political issues. Discover driving forces in cybersecurity including money, mobile devices, education, and new technologies, and explore the risks associated with portable electronic devices (PED) such as geolocations. Explore how supervisory control and data acquisition (SCADA) systems can be used to monitor important infrastructure including electric grids, water supplies, and pipelines, and discover how most people now use the Internet daily to send email, shop, and watch TV. Lastly, discover how cybersecurity and IT standards continue to evolve and how no one standard is foolproof or future proof. This course was originally created by Global Knowledge (GK).

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    List possible constraints that may prevent an organization from having an ideal it security solution including budget, regulations, design limitations, and political issues
    Discuss driving forces in cybersecurity including money, mobile devices, education, and new technologies
    Discuss how mobile devices have become a core part of modern lifestyle
    Recognize the risks associated with portable electronic devices (ped) such as geolocations
    Recognize that social media is generally the most used app on a mobile device
    Provide an overview of the internet of things (iot) and examples of security risks they pose
    Describe how supervisory control and data acquisition (scada) systems can be used to monitor important infrastructure including electric grids, water supplies, and pipelines
    Recognize the lack of standards that apply to iot implementations
  • Describe how new technologies can be exploited
    Describe how most people now use the internet daily to send email, shop, and watch tv
    Discuss how computers are all around us, including in vehicles and homes
    Describe the potential impact of a global internet outage
    Describe how identity management can become a growing challenge as individuals and organizations become more connected
    Manage credentials and unique account details using a credential manager
    Describe how individuals are accessing a growing number of systems on a daily basis whether for personal or business use
    Discuss how cybersecurity and it standards continue to evolve and that no one standard is foolproof or future proof
    Provide an overview of strategies for user training and awareness

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 200 users Rating 4.4 of 200 users (200)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.4 of 231 users Rating 4.4 of 231 users (231)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 200 users Rating 4.4 of 200 users (200)
Rating 4.5 of 19 users Rating 4.5 of 19 users (19)
Rating 4.4 of 91 users Rating 4.4 of 91 users (91)