Cyber Security Essentials

Cyber Security Essentials

Im Digital-Abo enthalten.

  • Von
  • Adam Lacey

Flatrate 12 Monate

17 $ pro Monat

inkl. 7 % MwSt.

  • 12 Monate
  • Einzellizenz
  • 17 $ $199 pro Jahr
  • 700+ eBooks und Video-Tutorials
  • Tipps und Tricks von Experten
  • Sofortiger Zugriff
  • Verlängert sich automatisch
Jetzt bestellen

Weitere Optionen
ab 12 € / Monat

Weitere Informationen

Teilen Sie dieses Produkt

Sprache

Englisch

Schwierigkeit

Anfänger

Veröffentlichung

2022

Welcome to Audio Learning from Assemble You.

 

1 – Introduction to Malware

Malware is a portmanteau, a combination of the words – “malicious” and “software.” It’s malicious software that is designed to cause harm to a system. It could be simply deleting data or, even more perniciously, hiding like a spy in the system, monitoring our activities. It can capture your keystrokes and send them to the person, the hacker, who planted the malware in our system. This means that if we are entering a password somewhere, let’s say in our online bank account, that person controlling the malware also gets to know it. Almost everything is visible to the hacker: our data, confidential files, photographs… almost everything.

Sounds scary, right? It is, but that doesn’t mean we’re helpless.

In this track, we’ll go through some of the different types of malware and what you can do to protect yourself against them.

 

Learning Objectives:

  • Learn what your malware is
  • Learn about a variety of types of malware
  • Learn how to protect yourself against malware

 

Aimed at:

  • Anyone looking to develop a solid basic understanding of malware, and how to use cybersecurity measures to limit its threat to a person or organization.

 

2 – Introduction to Social Engineering

In his book How to Hack a Human: Cybersecurity for the Mind, security expert Raef Meeuwisse defines social engineering as

…the act of constructing relationships, friendships or other human interactions for the purpose of enticing the recipient to perform an inadvisable action or reveal secret information.

In cybersecurity terms, this means preying on our emotional responses to make us voluntarily compromise our own security.

In this track, we’ll learn about social engineering attacks, the standard techniques used in them, and how we can protect ourselves against them.

 

Learning Objectives:

  • Learn what social engineering is, and how it’s specifically used in a cyber security context.
  • Learn about famous examples of social engineering hacks
  • Learn about the techniques you must use to avoid falling prey to a social engineer

 

Aimed at:

  • Anyone looking to build a basic understanding of cyber security threats and how to deal with them.

 

3 – Using and Managing Passwords

Today we are discussing using and managing passwords.

Your house often contains the most valuable possessions you own. Family heirlooms, pictures of your family, jewelry, and whatever else. Would you leave the front door open to allow anyone to walk in and take those valuable items? What about if you knew thieves were prowling? Would you lock up then?

People go to great lengths to protect their homes. So, why are we so willing to forego this level of security online? Where we do our banking. Where we shop for things. Where we have some of our most confidential conversations. 123456 is the most popular password on the internet. 123456!! According to Schneider Downs, it’s used by 103 million people. And it can be compromised in less than a second.

In this track, we’ll learn about the importance on how to create and maintaining secure passwords.

 

Learning Objectives:

  • Learn about the most common pitfalls when it comes to creating and maintaining passwords
  • Learn about the best-practices when it comes to making and managing passwords.

 

Aimed at:

  • Anyone looking to build a basic understanding of cyber security threats and how to deal with them.

 

4 – Common Types of Attack

Hackers conduct cyber attacks to steal information, sabotage one or more systems, or bring down a working network. They can also attack several systems at once, gain control, and use these systems to initiate another attack on a different network altogether.

In this track, we’ll learn about social engineering, malware, ransomware, distributed denial of service, Man-in-the-middle (MITM) attacks, insider threats, credential reuse, and mobile attacks.

 

Learning Objectives:

  • Learn about the most common threats to cyber security
  • Learn the techniques to protect yourself against common attacks

 

Aimed at:

  • Anyone looking to build a basic understanding of cyber security threats and how to deal with them.