Internet And Network Technologies
Exploring Security Trends
Attack Vectors and Mitigations
Vulnerabilities and Exploits

Attack Vectors and Mitigations

Course Number:
sp_exsd_a01_it_enus
Lesson Objectives

Attack Vectors and Mitigations

  • start the course
  • describe how the prevalence of mobile devices has created a whole new platform for vulnerabilities
  • list the pros and cons that can arise from a BYOD environment in a workplace
  • specify how outsourcing IT can affect the overall security of a business
  • specify how more and more everyday devices becoming Internet connected can have negative effects on security
  • describe how wearables and other nontraditional platforms being connected can raise security concerns
  • recognize why TLS is becoming more prevalent and why its use is recommended
  • protect stored data with encryption
  • specify how insecure databases can lead to large data leaks
  • describe why putting data in the cloud can be useful and some ways to secure it
  • enable encryption to protect cloud data at rest
  • determine how DLP can secure digital assets
  • identify why multi-factor authentication has come into common use and its benefits
  • secure cloud user accounts with MFA
  • describe how Single Sign-On can be used to improve security
  • recognize how organizations are beginning to protect themselves from IT attacks
  • list common sources of security breaches and how to protect against them

Overview/Description
In this course, potential security breach sources such as mobile and IoT devices are explained. Cyber insurance is becoming more common as companies seek to protect their IT systems.

Target Audience
Executives or IT staff seeking to identify common threat sources and their mitigations

Vulnerabilities and Exploits

Course Number:
sp_exsd_a02_it_enus
Lesson Objectives

Vulnerabilities and Exploits

  • start the course
  • describe what white hat hackers are and how they can help ameliorate the security of a business or product
  • describe what social engineering is and why it can be so dangerous
  • specify how phishing can affect the security of a business
  • recognize deceptive e-mail messages
  • describe how exploit kits can be used to take advantage of vulnerabilities in operating systems and applications
  • define ransomware attacks and how they can affect sensitive data
  • describe how the influence of governments in hacking incidents has become a large issue for IT security
  • specify how bug bounties can help result in more exploits being found and fixed
  • describe how web-based applications have gained more popularity and what implications for data security they have
  • describe how WAFs can protect web applications
  • list and define disaster recovery terms such as BCP, DRP, RTO, and RPO
  • dsecribe how malicious users use tools to exploit vulnerabilities

Overview/Description
This course covers how common threat sources actually get exploited. You will learn about social engineering, exploit kits, ransomware, and much more.

Target Audience
Individuals and organizations interested in improving security at all IT levels, and security auditors

Close Chat Live