Attack Vectors & Mitigations

Beginner
  • 16 videos | 1h 12m 2s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 185 users Rating 4.5 of 185 users (185)
Cyber insurance is becoming more common as companies seek to protect their IT systems. During this course, you will explore potential security breach sources such as mobile and IoT devices. Topics include the pros and cons of workplace Bring Your Own Device (BYOD) policies; the risks of outsourcing your IT; how internet-connected devices, including wearable gadgets, may present security risks. You will also discover how Transport Layer Security (TLS) plays a key role, and learn how to protect stored data with encryption, such as BitLocker. As you progress through the course, you will explore how insecure databases can leak data; and learn how to evaluate cloud data security options, Data Loss Prevention (DLP), Multi-factor Authentication (MFA), cloud MFA, Single Sign-On (SSO), Identity Federation, and cyber insurance. You will conclude by listing common sources of security breaches and how to protect against them.

WHAT YOU WILL LEARN

  • Describe how the prevalence of mobile devices has created a whole new platform for vulnerabilities
    List the pros and cons that can arise from a byod environment in a workplace
    Specify how outsourcing it can affect the overall security of a business
    Specify how more and more everyday devices becoming internet connected can have negative effects on security
    Describe how wearables and other nontraditional platforms being connected can raise security concerns
    Recognize why tls is becoming more prevalent and why its use is recommended
    Protect stored data with encryption
    Specify how insecure databases can lead to large data leaks
  • Describe why putting data in the cloud can be useful and some ways to secure it
    Enable encryption to protect cloud data at rest
    Determine how dlp can secure digital assets
    Identify why multi-factor authentication has come into common use and its benefits
    Secure cloud user accounts with mfa
    Describe how single sign-on can be used to improve security
    Recognize how organizations are beginning to protect themselves from it attacks
    List common sources of security breaches and how to protect against them

IN THIS COURSE

  • 5m 36s
    After completing this video, you will be able to describe how the prevalence of mobile devices has created a whole new platform for vulnerabilities. FREE ACCESS
  • 3m 27s
    Upon completion of this video, you will be able to list the pros and cons of a BYOD environment in a workplace. FREE ACCESS
  • Locked
    3.  Outsourced IT
    5m 37s
    Upon completion of this video, you will be able to specify how outsourcing IT can affect the overall security of a business. FREE ACCESS
  • Locked
    4.  Smart Appliances and IoT devices
    4m 4s
    After completing this video, you will be able to specify how more and more everyday devices becoming Internet connected can have negative effects on security. FREE ACCESS
  • Locked
    5.  Wearables and Vulnerabilities
    4m 2s
    Upon completion of this video, you will be able to describe how wearables and other nontraditional platforms being connected can raise security concerns. FREE ACCESS
  • Locked
    6.  TLS
    6m
    Upon completion of this video, you will be able to recognize why TLS is becoming more prevalent and why its use is recommended. FREE ACCESS
  • Locked
    7.  Use BitLocker to Protect Data at Rest
    3m 57s
    In this video, you will learn how to protect stored data with encryption. FREE ACCESS
  • Locked
    8.  Data at Rest
    3m 9s
    After completing this video, you will be able to specify how insecure databases can lead to large data leaks. FREE ACCESS
  • Locked
    9.  Securing Data in the Cloud
    5m 50s
    Upon completion of this video, you will be able to describe why putting data in the cloud can be useful and some ways to secure it. FREE ACCESS
  • Locked
    10.  Encrypting Cloud Data
    3m 31s
    In this video, you will learn how to enable encryption to protect cloud data at rest. FREE ACCESS
  • Locked
    11.  Data Loss Prevention (DLP)
    6m 49s
    In this video, you will learn how DLP can secure digital assets. FREE ACCESS
  • Locked
    12.  Multi-factor Authentication (MFA)
    3m 1s
    In this video, you will identify why multi-factor authentication has become common and its benefits. FREE ACCESS
  • Locked
    13.  Enable Cloud Multi-factor Authentication
    4m 14s
    In this video, you will learn how to secure cloud user accounts using MFA. FREE ACCESS
  • Locked
    14.  Single Sign-On and Identity Federation
    5m 27s
    Upon completion of this video, you will be able to describe how Single Sign-On can improve security. FREE ACCESS
  • Locked
    15.  Cyber Insurance
    2m 3s
    Upon completion of this video, you will be able to recognize how organizations are beginning to protect themselves from IT attacks. FREE ACCESS
  • Locked
    16.  Exercise: Threat Identification
    5m 18s
    After completing this video, you will be able to list common sources of security breaches and how to protect against them. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 27 users Rating 4.4 of 27 users (27)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 27 users Rating 4.8 of 27 users (27)
Rating 4.5 of 386 users Rating 4.5 of 386 users (386)
Rating 4.4 of 121 users Rating 4.4 of 121 users (121)