Skip to content
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Catalog
About
Contact Us
Login
Sign Up
$
0.00
0
Cart
Login
Sign Up
$
0.00
0
Cart
Login
Sign Up
$
0.00
0
Cart
Home
All Programs
Computers
Security
General
Module 1: Getting Started with Cybersecurity
Module 1: Getting Started with Cybersecurity
Curriculum
3 Sections
21 Lessons
10 Weeks
Expand all sections
Collapse all sections
What Exactly Is Cybersecurity?
3
1.1
Cybersecurity Means Different Things to Different Folks
1.2
Cybersecurity Is a Constantly Moving Target
1.3
Looking at the Risks Cybersecurity Mitigates
Getting to Know Common Cyberattacks
12
2.1
Attacks That Inflict Damage
2.2
Is That Really You? Impersonation
2.3
Messing around with Other People’s Stuff: Tampering
2.4
Captured in Transit: Interception
2.5
Taking What Isn’t Theirs: Data Theft
2.6
Cyberbombs That Sneak into Your Devices: Malware
2.7
Poisoned Web Service Attacks
2.8
Network Infrastructure Poisoning
2.9
Malvertising
2.10
Exploiting Maintenance Difficulties
2.11
Advanced Attacks
2.12
Some Technical Attack Techniques
The Bad Guys You Must Defend Against
6
3.1
Bad Guys and Good Guys Are Relative Terms
3.2
Bad Guys Up to No Good
3.3
Cyberattackers and Their Colored Hats
3.4
How Cybercriminals Monetize Their Actions
3.5
Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats
3.6
Defending against These Attackers
This content is protected, please
login
and
enroll
in the course to view this content!
Login
or
Sign Up
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Cybersecurity
Courses
Community
News
Knowledgebase
Catalog
About
Contact Us
Linkedin
Instagram
Modal title
Main Content