Cybersecurity Awareness: Key Security Terms & Concepts
Cybersecurity
| Beginner
- 17 videos | 2h 20m 21s
- Includes Assessment
- Earns a Badge
Everyone who connects to the Internet is vulnerable to security threats. Managers need to know the types of security threats their organizations are vulnerable to and their potential impact. In this course, you'll explore the key terms used in cybersecurity. You'll examine different types of threats, threat actors, and targets. You'll investigate advanced persistent threats (APTs), insider threats, and uncertainty in relation to cybersecurity, as well as the various types of malware and security threats
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe key concepts of cybersecurity assets and risksDescribe the key terms associated with cybersecurity threatsRecognize the key concepts of cybersecurity vulnerability and countermeasuresList the types of threat actors and their motivesList the types of attack targetsDefine what is meant by security exposure and a security threat or riskList types of cybersecurity threatsDescribe what comprises mobile technology threats
-
Define what is meant by cloud threats and list types of such threatsDefine advanced persistent threats (apts)Give an example of an aptDescribe how an insider threat in an organization would manifestDescribe what malware is and list standard types of malwareList the steps performed in a cyber attack on securityDefine what is meant by uncertainty in cybersecuritySummarize the key concepts covered in this course
IN THIS COURSE
-
2m 26sIn this video, you will learn more about your instructor and the course. In this course, you will learn more about security, the key terms used in cybersecurity, and mobile and cloud threats. FREE ACCESS
-
7mIn this video, you will learn cybersecurity terms. These are necessary in order to pursue this learning track. This video will cover the terms asset and risk. An asset is anything that has value to an organization. A risk is the probability or potential that a loss can occur. FREE ACCESS
-
9m 22sIn this video, you will look at several cybersecurity terms. First, you will define threat. A threat is anything that exploits vulnerabilities or bugs in a system or application. Next, you will take a look at threat actor. A threat actor is an entity responsible for a threat. Then, you will explore attack vectors. This any method used to launch the threat actor. Finally, you will define target, the goal of the threat actor. FREE ACCESS
-
5m 20sIn this video, you will look at vulnerability. A vulnerability is a flaw or a weakness in the system. These vulnerabilities can be exploited by a threat actor. You will also learn about countermeasures. Countermeasures are security controls. You will learn how these security controls help protect information. FREE ACCESS
-
9m 55sIn this video, you will learn about the types of threat actors and their motives. Types of threat actors include advanced persistent threats (APTs), cybercriminals, hacktivists, and terrorists. Other threat actors include insider threats, script kiddies, and nation-state actors. There are two categories of threat actors, internal and external. Next, you will look at examples of all these threat actors. FREE ACCESS
-
7m 27sIn this video, you will learn about the types of attack targets. Who is the target of an attack? This can be anyone on the internet, both individuals and organizations. These can be accidental or carefully selected targets. Typically, threat actors do reconnaissance to find their targets. The types of targets include chemical, electronic, automotive, manufacturing, and aerospace. Types of targets may also include healthcare, government, energy, telecommunications, and consumer. FREE ACCESS
-
3m 25sIn this video, you will learn what is meant by security exposure, security threat, and risk. A security threat exploits a vulnerability and causes damage. A risk is the potential that a threat will materialize and cause harm. An exposure is something that increases the likelihood of a risk. FREE ACCESS
-
3m 41sIn this video, you will look at the types of security threats. Cybersecurity threats are categorized as internal, external, and natural. You need to understand the type of security threat you are dealing with in order to deal with it correctly. Internal threats come from internal employees. External threats can be from hackers. Natural threats are those that come from things like fires or floods. FREE ACCESS
-
9m 16sIn this video, you will learn what makes up mobile technology threats. Mobile threats are caused by improper usage, insecure data storage, insecure communications, insecure authentication, or insufficient cryptography. Mobile technology threats include code tampering, insecure authentication, client code quality, reverse engineering, and extraneous functionality. Next, you will discuss mobile malware. FREE ACCESS
-
9m 38sIn this video, you will learn what is meant by cloud threats. Cloud threats include management interface failure, virtual machine attacks, malicious insiders, weak authentication, inadequate infrastructure design, multitenancy, and misconfigurations. Threats specific to cloud applications and data include social engineering, cross-site scripting, domain name system (DNS), and SQL injections. FREE ACCESS
-
12m 49sIn this video, you will learn to define advanced persistent threats (APTs). Next, you will look at the characteristics of APTs. They use social engineering, they work with clear objectives, they are well-funded, and they are well-organized. APTs conduct low profile, stealthy attacks. APT actors include a variety of hackers. These include nation-state actors, organized crime groups, hacktivists, cyber terrorists, and those who are committing espionage. Finally, you will explore an APT lifecycle. FREE ACCESS
-
8m 14sIn this video, you will look at examples of APTs. One of the most well known is The Equation Group, and you will look at this group in more depth. You will also explore methods for strengthening an APT defense. This includes digging deeper into errors, broadening your scope, and using next-gen security methods. FREE ACCESS
-
16m 59sIn this video, you will look at how an insider threat might manifest. You need to understand who the insider is. The insider is any internal employee who has access to internal resources. These insider threats are difficult to detect as they are invisible. They are inside the organization and have access. Insider threats include pure insider, insider associate, insider affiliate, and outsider affiliate. You will also look at examples of insider threats. FREE ACCESS
-
13m 38sIn this video, you will learn what malware is and look at different types that exist today. Malware is malicious software. It is any software that disrupts the system or the network. Malware can cripple the internet. Malware threat actors perform reconnaissance, they then trick the users, direct the users somewhere where they infect the users' devices, and finally, the downloaded malware causes damage. FREE ACCESS
-
11m 37sIn this video, you will learn the steps performed in a cyberattack. An attack is always conducted by a threat actor. It can be direct or through a threat vector, like malware. It is directed toward an individual or an organization. The steps in an attack are reconnaissance, scanning, access and escalation, exfiltration, sustainment, assault, and obfuscation. You will cover each step with examples. FREE ACCESS
-
6m 47sIn this video, you will learn what is meant by uncertainty in security. Uncertainty is simply when you are unsure. In security, a risk is uncertainty that has varied outcomes. There are three phases of uncertainty. These include prior security risk management, real-time intrusion detection, and posterior forensic analysis. Finally, you will look at approaches to handling uncertainty. You can take a logical approach or a statistical approach. The video will explain each with examples. FREE ACCESS
-
2m 47sIn this video, you will summarize what you've learned in the course. You've learned key terms and the types of threat actors. You also learned about attack targets and concepts of security threat risks and exposure. You learned about the types of security threats. The course also taught you about APTs, and you looked at examples. You learned about the motivations for insider threats. Finally, the course covered malware and the steps in security attacks. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.