Cyber Security Essentials

Cyber Security Essentials

フラットレートに含まれます。

  • Adam Lacey

Flatrate 12 月

17 $ 1ヶ月あたり

incl. 7% VAT

  • 12ヶ月
  • シングルライセンス
  • 17 $ $199 年間
  • 700以上の電子ブックとビデオチュートリアル
  • 専門家からのヒントやコツ
  • インスタントアクセス
  • 自動的に更新されます

製品を共有する

言語

en

レベル

初心者

出版

2022

Welcome to Audio Learning from Assemble You.

1 – Introduction to Malware

Malware is a portmanteau, a combination of the words – “malicious” and “software.” It’s malicious software that is designed to cause harm to a system. It could be simply deleting data or, even more perniciously, hiding like a spy in the system, monitoring our activities. It can capture your keystrokes and send them to the person, the hacker, who planted the malware in our system. This means that if we are entering a password somewhere, let’s say in our online bank account, that person controlling the malware also gets to know it. Almost everything is visible to the hacker: our data, confidential files, photographs… almost everything. 

Sounds scary, right? It is, but that doesn’t mean we’re helpless.

In this track, we’ll go through some of the different types of malware and what you can do to protect yourself against them.

Learning Objectives: 

  • Learn what your malware is
  • Learn about a variety of types of malware
  • Learn how to protect yourself against malware

Aimed at:

  • Anyone looking to develop a solid basic understanding of malware, and how to use cybersecurity measures to limit its threat to a person or organization.

2 – Introduction to Social Engineering

In his book How to Hack a Human: Cybersecurity for the Mind, security expert Raef Meeuwisse defines social engineering as 

…the act of constructing relationships, friendships or other human interactions for the purpose of enticing the recipient to perform an inadvisable action or reveal secret information.

In cybersecurity terms, this means preying on our emotional responses to make us voluntarily compromise our own security.

In this track, we’ll learn about social engineering attacks, the standard techniques used in them, and how we can protect ourselves against them.

Learning Objectives: 

  • Learn what social engineering is, and how it’s specifically used in a cyber security context.
  • Learn about famous examples of social engineering hacks
  • Learn about the techniques you must use to avoid falling prey to a social engineer

Aimed at:

  • Anyone looking to build a basic understanding of cyber security threats and how to deal with them.

3 – Using and Managing Passwords

Today we are discussing using and managing passwords. 

Your house often contains the most valuable possessions you own. Family heirlooms, pictures of your family, jewelry, and whatever else. Would you leave the front door open to allow anyone to walk in and take those valuable items? What about if you knew thieves were prowling? Would you lock up then?

People go to great lengths to protect their homes. So, why are we so willing to forego this level of security online? Where we do our banking. Where we shop for things. Where we have some of our most confidential conversations. 123456 is the most popular password on the internet. 123456!! According to Schneider Downs, it’s used by 103 million people. And it can be compromised in less than a second.

In this track, we’ll learn about the importance on how to create and maintaining secure passwords.

Learning Objectives: 

  • Learn about the most common pitfalls when it comes to creating and maintaining passwords
  • Learn about the best-practices when it comes to making and managing passwords.

Aimed at:

  • Anyone looking to build a basic understanding of cyber security threats and how to deal with them. 

4 – Common Types of Attack

Hackers conduct cyber attacks to steal information, sabotage one or more systems, or bring down a working network. They can also attack several systems at once, gain control, and use these systems to initiate another attack on a different network altogether.

In this track, we’ll learn about social engineering, malware, ransomware, distributed denial of service, Man-in-the-middle (MITM) attacks, insider threats, credential reuse, and mobile attacks.

Learning Objectives: 

  • Learn about the most common threats to cyber security
  • Learn the techniques to protect yourself against common attacks

Aimed at:

  • Anyone looking to build a basic understanding of cyber security threats and how to deal with them.