“Your data may have been breached.”  It seems like that is a headline on an all too frequent basis.  These attacks can be avoided.  In this course we will discuss technologies that can be implemented to effectively prevent hacking attempts, viruses and phishing attempts from becoming a disastrous event.

This course helps you learn the meaning of key terminology and some tools and techniques that can be implemented to mitigate the risk associated with viruses, hacking attempts and phishing schemes. We delve into how attacks work and technology that can be implemented for prevention.  Lastly, we discuss simple controls that can be implemented, critical monitoring that should be performed, and important training that needs to occur.

Learning Objectives
  • Discover controls/processes to prevent breaches from occurring. 
  • Discover how data breaches have occurred.
  • Recognize the differences among various types of protection products.
  • Discover the technology utilized to protect organizations.
  • Explore how to map security controls to the National Institute of Standards and Technology (NIST) Cybersecurity Control Framework.
Last updated/reviewed: March 9, 2024
21 Reviews (89 ratings)

Reviews

3
Anonymous Author
Instructor did way too much reading of the slides and cartoons to the listeners. Excessive amounts of verbage and detail in both slides and framework matrix. I kind of checked out after seeing that matrix. While she did present some great examples of companies who failed to protect their data, I think she just needs to adjust her presentation for those of us who are not computer/IT nerds. She is very very knowledgeable in her field no doubt but I would have preferred a more high level class.

5
Anonymous Author
Very informative course that covers a great deal of information on protecting your data from a number of schemes including phishing, hacks, etc. The course has some interesting points about high profile incidents that could have been prevented if patch's, proper training was implemented. Great course shows the importances of cyber security

5
Member's Profile
GOOD

5
Anonymous Author
The examples helped a lot because we do get phishing emails. It is very risky because spam tends to get access even with certain restrictions in place. It really does shed light to be very aware of our cyber security.

3
Anonymous Author
Good information. Liked knowing how the big data breaches happened. May have enjoyed the course more if not reading directly from the slides.

4
Member's Profile
A great start for a firm looking to deploy remote access. could be more in-depth however I realize it is probably multiple courses

3
Anonymous Author
Quoting from Wikipedia doesn't seem professional. There was a lot of terminology thrown around that I have no idea what it means.

5
Anonymous Author
Very informative course. Really liked the real life examples of the major security breaches and reasons why they happened.

4
Anonymous Author
This is a great training on cybersecurity. I enjoyed learning about the different techniques to protect the data.

4
Anonymous Author
This is a refresher course. Nothing surprised me. This training will be most beneficial to performance auditors.

4
Anonymous Author
Great content, but I believe that the presentation needs a little more visual material.

5
Anonymous Author
Great job. Thank you so much. It was very informative. I appreciate it. good work.

5
Member's Profile
Very insightful knowledge into the world of hackers, viruses and phishing schemes

5
Anonymous Author
I thought the information shared was helpful and gave you things to think about.

5
Member's Profile
Good high-level ovreview; also good to review some basic terminology

2
Anonymous Author
waste of time, would not recommend, did not learn anything useful

4
Anonymous Author
Nice course for the time. Picked up several helpful tips.

4
Member's Profile
Good overview of ways to protect yourself from attacks.

4
Member's Profile
Great oversight cyber attacks and solutions. Thank you!

4
Anonymous Author
easy to follow, good information, straightfoward......

5
Anonymous Author
Very easy to understand the main points presentation.

Prerequisites
Course Complexity: Intermediate

No advanced preparation or prerequisites are required for this course.

Education Provider Information
Company: Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact: For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Instructor for this course
Course Syllabus
INTRODUCTION AND OVERVIEW
  Introduction to Protect Your Data from Hackers, Virus and Phishing Schemes5:51
  Preventing a Data Breach8:36
  Preventing a Data Breach Continued..6:33
  The Biggest Data Breaches9:14
  The Biggest Data Breaches Continued..7:59
  Cyber Security Framework13:52
  Cyber Security Framework Continued and Conclusion3:19
CONTINUOUS PLAY
  Protect Your Data from Hackers, Virus and Phishing Schemes 55:28
Supporting Materials
  Slides: Protect Your Data from Hackers, Virus and Phishing SchemesPDF
  Protect Your Data from Hackers, Virus and Phishing Schemes Glossary/IndexPDF
REVIEW AND TEST
  REVIEW QUESTIONS quiz
 FINAL EXAMexam