An Executive's Guide to Security: Understanding Security Threats
Cybersecurity
| Beginner
- 13 videos | 44m 43s
- Includes Assessment
- Earns a Badge
Companies that do not understand threats facing their information are at risk of costly data breaches. In this 13-video course, learners can explore common security threats, types of network attacks, and the human element of security threats. Key concepts covered here include what an attack surface is, and how it must be understood to protect corporate information; and what network hardening is and how it relates to protection of corporate information. Next, learners will examine network demilitarized zones and how they protect corporate information; observe differences between threats, vulnerabilities, and risks in corporate environments; and study top kinds of security threats facing organizations today. Continue by learning the role that physical security plays in protecting corporate data; how social engineering is conducted and how it is mitigated through corporate policy; and the importance of corporate security policies, and why they should be strictly adhered to. Finally, explore the importance of password policies and why they should be adhered to; and learn reasons why IT administrators need to protect an organization by refusing to bend rules.
WHAT YOU WILL LEARN
-
Describe what an attack surface is and how it must be understood in order to protect corporate informationSpecify what network hardening is and how it relates to the protection of corporate informationDiscuss network demilitarized zones and how they help protect corporate informationDescribe the differences between threats, vulnerabilities, and risks in a corporate environmentSpecify the top kinds of security threats facing organizations todayDiscuss the common types of security attacks and how they each pose a risk to organizational data
-
Describe the role physical security plays in the protection of corporate dataSpecify how social engineering is conducted and how it can be mitigated through corporate policyDiscuss the importance of corporate security policies and why they should be strictly adhered toDescribe the importance of password policies and why they should be adhered toSpecify the reasons why it administrators need to protect an organization by refusing to bend the rulesDescribe security threats, network hacks and attacks, and the human element in protecting organizational information
IN THIS COURSE
-
1m 9s
-
4m 21sUpon completion of this video, you will be able to describe what an attack surface is and how it must be understood in order to protect corporate information. FREE ACCESS
-
6m 40sAfter completing this video, you will be able to specify what network hardening is and how it relates to the protection of corporate information. FREE ACCESS
-
3m 41sIn this video, you will discuss network demilitarized zones and how they help protect corporate information. FREE ACCESS
-
3m 26sAfter completing this video, you will be able to describe the differences between threats, vulnerabilities, and risks in a corporate environment. FREE ACCESS
-
2m 56sAfter completing this video, you will be able to specify the most common types of security threats facing organizations today. FREE ACCESS
-
6m 31sIn this video, you will discuss the common types of security attacks and how they each pose a risk to organizational data. FREE ACCESS
-
2m 44sAfter completing this video, you will be able to describe the role physical security plays in protecting corporate data. FREE ACCESS
-
2m 54sAfter completing this video, you will be able to specify how social engineering is conducted and how it can be mitigated through corporate policy. FREE ACCESS
-
2m 32sDuring this video, you will learn how to discuss the importance of corporate security policies and why it is important to follow them closely. FREE ACCESS
-
2m 21sAfter completing this video, you will be able to describe the importance of password policies and why you should adhere to them. FREE ACCESS
-
3m 25sAfter completing this video, you will be able to specify the reasons why IT administrators need to protect an organization by refusing to break the rules. FREE ACCESS
-
2m 3sUpon completion of this video, you will be able to describe security threats, network hacks and attacks, and the human element in protecting organizational information. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.