Skip to content
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Catalog
About
Contact Us
Login
Sign Up
$
0.00
0
Cart
Login
Sign Up
$
0.00
0
Cart
Login
Sign Up
$
0.00
0
Cart
Home
All Programs
Part 1: Getting Started with Cybersecurity
Part 1: Getting Started with Cybersecurity
Curriculum
3 Sections
21 Lessons
Lifetime
Expand all sections
Collapse all sections
Chapter 1: What Exactly Is Cybersecurity?
3
12.13
Cybersecurity Means Different Things to Different Folks
12.14
Cybersecurity Is a Constantly Moving Target
12.15
Looking at the Risks Cybersecurity Mitigates
Chapter 2: Getting to Know Common Cyberattacks
12
16.17
Attacks That Inflict Damage
16.18
Is That Really You? Impersonation
16.19
Messing around with Other People’s Stuff: Tampering
16.20
Captured in Transit: Interception
16.21
Taking What Isn’t Theirs: Data Theft
16.22
Cyberbombs That Sneak into Your Devices: Malware
16.23
Poisoned Web Service Attacks
16.24
Network Infrastructure Poisoning
16.25
Malvertising
16.26
Exploiting Maintenance Difficulties
16.27
Advanced Attacks
16.28
Some Technical Attack Techniques
Chapter 3: The Bad Guys You Must Defend Against
6
29.30
Bad Guys and Good Guys Are Relative Terms
29.31
Bad Guys Up to No Good
29.32
Cyberattackers and Their Colored Hats
29.33
How Cybercriminals Monetize Their Actions
29.34
Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats
29.35
Defending against These Attackers
This content is protected, please
login
and
enroll
in the course to view this content!
Login
or
Sign Up
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Cybersecurity
Courses
Community
News
Knowledgebase
Catalog
About
Contact Us
Linkedin
Instagram
Modal title
Main Content