Trends in Cybersecurity
Cybersecurity
| Beginner
- 18 videos | 45m 34s
- Includes Assessment
- Earns a Badge
Cybersecurity is the practice of protecting systems, networks, and programs from cyber threats and exploits. Therefore, organizations are required to allocate a growing number of resources to protect their data from unwanted and unauthorized data breaches and disclosures. In this course, you'll explore the possible constraints that may prevent an organization from having an ideal IT security solution including budget, regulations, design limitations, and political issues. Discover driving forces in cybersecurity including money, mobile devices, education, and new technologies, and explore the risks associated with portable electronic devices (PED) such as geolocations. Explore how supervisory control and data acquisition (SCADA) systems can be used to monitor important infrastructure including electric grids, water supplies, and pipelines, and discover how most people now use the Internet daily to send email, shop, and watch TV. Lastly, discover how cybersecurity and IT standards continue to evolve and how no one standard is foolproof or future proof. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseList possible constraints that may prevent an organization from having an ideal it security solution including budget, regulations, design limitations, and political issuesDiscuss driving forces in cybersecurity including money, mobile devices, education, and new technologiesDiscuss how mobile devices have become a core part of modern lifestyleRecognize the risks associated with portable electronic devices (ped) such as geolocationsRecognize that social media is generally the most used app on a mobile deviceProvide an overview of the internet of things (iot) and examples of security risks they poseDescribe how supervisory control and data acquisition (scada) systems can be used to monitor important infrastructure including electric grids, water supplies, and pipelinesRecognize the lack of standards that apply to iot implementations
-
Describe how new technologies can be exploitedDescribe how most people now use the internet daily to send email, shop, and watch tvDiscuss how computers are all around us, including in vehicles and homesDescribe the potential impact of a global internet outageDescribe how identity management can become a growing challenge as individuals and organizations become more connectedManage credentials and unique account details using a credential managerDescribe how individuals are accessing a growing number of systems on a daily basis whether for personal or business useDiscuss how cybersecurity and it standards continue to evolve and that no one standard is foolproof or future proofProvide an overview of strategies for user training and awareness
IN THIS COURSE
-
41s
-
3m 21s
-
4m 43s
-
3m 8s
-
3m 19s
-
1m 43s
-
5m 6s
-
1m 6s
-
1m 1s
-
6m 44s
-
2m 39s
-
1m 24s
-
1m 41s
-
2m 38s
-
2m 14s
-
46s
-
1m 50s
-
1m 30s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.