As tech systems continue to grow in complexity, cybersecurity threats are becoming increasingly more effective and damaging. News headlines regularly announce enormous data breaches and sophisticated hacks. How are these attackers getting in, and what actions can you take to protect against them? In this course, Marc Menninger describes some of the most common cybersecurity threats, including phishing and ransomware, deepfakes, unmanaged Internet of Things (IoT) devices, business email compromise, and more. He then teaches the best countermeasures for reducing or eliminating the impact of these threats.
Released 6/30/2022
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
.pad/0
5 B
.pad/1
177.1 KB
.pad/10
145.2 KB
.pad/11
10.3 KB
.pad/12
138.7 KB
.pad/13
150.8 KB
.pad/14
214.8 KB
.pad/15
244.4 KB
.pad/16
78.6 KB
.pad/17
220.5 KB
.pad/18
144.3 KB
.pad/2
251.5 KB
.pad/3
201.8 KB
.pad/4
138 KB
.pad/5
156.5 KB
.pad/6
191.5 KB
.pad/7
41.7 KB
.pad/8
217.5 KB
.pad/9
139.8 KB
TutsNode.com.txt
63 B
[TutsNode.net] - The Cybersecurity Threat Landscape/01 - Introduction/01 - Examine the cybersecurity threat landscape.mp4
8.9 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/01 - Introduction/01 - Examine the cybersecurity threat landscape.srt
2.7 KB
[TutsNode.net] - The Cybersecurity Threat Landscape/02 - 1. Malware and Ransomware/01 - Explore the threat of malware and ransomware.mp4
11.1 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/02 - 1. Malware and Ransomware/01 - Explore the threat of malware and ransomware.srt
5.8 KB
[TutsNode.net] - The Cybersecurity Threat Landscape/02 - 1. Malware and Ransomware/02 - Protect against malware and ransomware.mp4
11.1 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/02 - 1. Malware and Ransomware/02 - Protect against malware and ransomware.srt
4.5 KB
[TutsNode.net] - The Cybersecurity Threat Landscape/03 - 2. Phishing and Smishing/01 - Explore the threat of phishing and smishing.mp4
10.7 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/03 - 2. Phishing and Smishing/01 - Explore the threat of phishing and smishing.srt
6.6 KB
[TutsNode.net] - The Cybersecurity Threat Landscape/03 - 2. Phishing and Smishing/02 - Protect against phishing and smishing.mp4
11.5 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/03 - 2. Phishing and Smishing/02 - Protect against phishing and smishing.srt
5.9 KB
[TutsNode.net] - The Cybersecurity Threat Landscape/04 - 3. Business Email Compromise/01 - Explore the threat of business email compromise.mp4
9 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/04 - 3. Business Email Compromise/01 - Explore the threat of business email compromise.srt
5.2 KB
[TutsNode.net] - The Cybersecurity Threat Landscape/04 - 3. Business Email Compromise/02 - Protect against business email compromise.mp4
8.8 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/04 - 3. Business Email Compromise/02 - Protect against business email compromise.srt
5 KB
[TutsNode.net] - The Cybersecurity Threat Landscape/05 - 4. Botnets and DDoS attacks/01 - Explore the threat of botnets and DDoS attacks.mp4
10.6 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/05 - 4. Botnets and DDoS attacks/01 - Explore the threat of botnets and DDoS attacks.srt
4.5 KB
[TutsNode.net] - The Cybersecurity Threat Landscape/05 - 4. Botnets and DDoS attacks/02 - Protect against botnets and DDoS threats.mp4
15.1 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/05 - 4. Botnets and DDoS attacks/02 - Protect against botnets and DDoS threats.srt
6.3 KB
[TutsNode.net] - The Cybersecurity Threat Landscape/06 - 5. Deepfakes/01 - Explore the threat of deepfakes.mp4
8.6 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/06 - 5. Deepfakes/01 - Explore the threat of deepfakes.srt
3.4 KB
[TutsNode.net] - The Cybersecurity Threat Landscape/06 - 5. Deepfakes/02 - Protect against deepfakes.mp4
11.6 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/06 - 5. Deepfakes/02 - Protect against deepfakes.srt
4.7 KB
[TutsNode.net] - The Cybersecurity Threat Landscape/07 - 6. Insider Threats/01 - Explore the risk of insider threats.mp4
10.4 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/07 - 6. Insider Threats/01 - Explore the risk of insider threats.srt
5.5 KB
[TutsNode.net] - The Cybersecurity Threat Landscape/07 - 6. Insider Threats/02 - Protect against insider threats.mp4
6.7 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/07 - 6. Insider Threats/02 - Protect against insider threats.srt
6 KB
[TutsNode.net] - The Cybersecurity Threat Landscape/08 - 7. Unmanaged IoT Devices/01 - Explore the threat of unmanaged IoT devices.mp4
13.8 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/08 - 7. Unmanaged IoT Devices/01 - Explore the threat of unmanaged IoT devices.srt
6.3 KB
[TutsNode.net] - The Cybersecurity Threat Landscape/08 - 7. Unmanaged IoT Devices/02 - Protect against unmanaged IoT devices.mp4
11.9 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/08 - 7. Unmanaged IoT Devices/02 - Protect against unmanaged IoT devices.srt
5.7 KB
[TutsNode.net] - The Cybersecurity Threat Landscape/09 - 8. Shadow IT/01 - Explore the threat of shadow IT.mp4
13.6 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/09 - 8. Shadow IT/01 - Explore the threat of shadow IT.srt
5.7 KB
[TutsNode.net] - The Cybersecurity Threat Landscape/09 - 8. Shadow IT/02 - Protect against shadow IT.mp4
11.8 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/09 - 8. Shadow IT/02 - Protect against shadow IT.srt
5.3 KB
[TutsNode.net] - The Cybersecurity Threat Landscape/10 - 9. Supply Chain Attacks and Third-Party Risks/01 - The threat of supply chain attacks and third-party risks.mp4
15.4 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/10 - 9. Supply Chain Attacks and Third-Party Risks/01 - The threat of supply chain attacks and third-party risks.srt
5.5 KB
[TutsNode.net] - The Cybersecurity Threat Landscape/10 - 9. Supply Chain Attacks and Third-Party Risks/02 - Protect against supply chain attacks and third-party risks.mp4
10 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/10 - 9. Supply Chain Attacks and Third-Party Risks/02 - Protect against supply chain attacks and third-party risks.srt
7 KB
[TutsNode.net] - The Cybersecurity Threat Landscape/11 - Conclusion/01 - Stay up to date on cybersecurity.mp4
11.3 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/11 - Conclusion/01 - Stay up to date on cybersecurity.srt