“Your data may have been breached.” It seems like that is a headline on an all too frequent basis. These attacks can be avoided. In this course we will discuss technologies that can be implemented to effectively prevent hacking attempts, viruses and phishing attempts from becoming a disastrous event.
This course helps you learn the meaning of key terminology and some tools and techniques that can be implemented to mitigate the risk associated with viruses, hacking attempts and phishing schemes. We delve into how attacks work and technology that can be implemented for prevention. Lastly, we discuss simple controls that can be implemented, critical monitoring that should be performed, and important training that needs to occur.
Learning Objectives
- Discover controls/processes to prevent breaches from occurring.
- Discover how data breaches have occurred.
- Recognize the differences among various types of protection products.
- Discover the technology utilized to protect organizations.
- Explore how to map security controls to the National Institute of Standards and Technology (NIST) Cybersecurity Control Framework.
21 Reviews (89 ratings)
Prerequisites
No advanced preparation or prerequisites are required for this course.