Advancements in technology have raised the level of acknowledgement of threats in the cyber age. These threats touch both the business world and personal lives. Information technology is no longer a “back-office” function.  Once considered a process area that was solely part of the Chief Information Officer’s domain, companies must now acknowledge that whether the threats are internal or external, they are very real and can and will cause harm to many organizations in many ways.  As a result, it is imperative that professionals across the company understand and be prepared to deal with the multitude of ever-growing cyber threats.   

In this two-part series, we examine the landscape of cyber threats as they currently exist.  We take a look at the biggest incidents related to cyber security of the 21st century (so far).  We then delve into obtaining an understanding of the various threats that can impact our everyday lives, both business and personal.   Part two of this series will deal with a topic that has hit the boardroom and governance body agenda of almost all companies – Cyber Risk Management.  In part two we discuss the various cyber risk management frameworks available and how your organization can utilize them to be prepared for the inevitable.

Training for all programs related to cyber security by this trainer are utilizing the framework of the National Institute of Standards and Technology (NIST) as a model. This information is freely available in the public domain. For more detailed information on the framework please refer to NIST.org.

Learning Objectives
  • Explore the meaning and impact of data breaches.
  • Examine recent cyber incidents and their impact on business.
  • Identify types and methods of the most proliferate cyber threats.
  • Explore actions professionals and organizations can take towards prevention of cyber threats.
Last updated/reviewed: January 5, 2023

Included In Certifications

This course is included in the following Certification Programs:

13 CoursesCorporate Cyber Security Certification

  1. Cyber Threat – The Modern-Day Fraud: Breaches and Actions
  2. A Primer on Cyber Security Programs and Roles
  3. Cyber Risk Frameworks And Concepts
  4. Cyber Risk Framework - Identify Assets
  5. Cyber Risk Framework - Prioritize Assets
  6. Cyber Risk Framework - Protect Assets
  7. Cyber Risk Framework - Detect Part One
  8. Cyber Risk Framework - Detect Threats Part Two
  9. Cyber Risk Framework - Respond
  10. Cyber Risk Framework - Recover
  11. Cyber Risk Framework - Utilizing The Tier Approach
  12. Fraud and Personal Identity Theft
  13. Fraud and Business Identity Theft
50 Reviews (218 ratings)

Reviews

4
Anonymous Author
This course provides an overview and understanding of data breaches and the impact of data breaches. It explains many cyber incidents that occurred and their impact on businesses. It provides and explanation of the different methods by which cyber threats are proliferated, and tells us what we can do to prevent cyber threats.

5
Anonymous Author
Useful definitions and explanations regarding cyber security threats to individuals and businesses. I liked that the presenter provided content sources as well as study date references. Additionally, the slides contained relevant information.

5
Member's Profile
Interesting and scary!

4
Member's Profile
The sound level was good in this video. The material was good and the examples made the subject matter more interesting. The instructor wasn't monotone in this video and it was clear that she enjoyed the subject.

5
Anonymous Author
This course provides a comprehensive view of data breaches and the impact of it. Instructor uses real-world examples of data breach through the decades for highlighting the importance of cyber security nowadays.

4
Anonymous Author
I liked the examples of major breaches, although I would have preferred to hear about them after an overview of the specific tactics used. It was helpful to know the business impact of breaches.

5
Member's Profile
Examples of data breaches were interesting and concerning - definitely highlights the need for good cyber security practices. Supplementary slides and glossary also very helpful.

5
Anonymous Author
The course introduces you to the different types of cyber security threats - appropriate and necessary before taking the remainder of the courses required for certification.

5
Member's Profile
This course was great at educating/refreshing the knowledge of cyber threats and came with a great glossary of terms for reference with easy to understand explanations.

4
Anonymous Author
a very comprehensive course which provides insights to cyber threats. great for risk managers, and auditors that don't have first hand understanding of these risks

4
Anonymous Author
..................................................................................................................................................................

4
Anonymous Author
Very interesting course, full of relevant terminology and real-life situations. Lynn Fountain again brings us helpful insight into the cyber security realm.

4
Anonymous Author
This course provides a good understanding of a variety of types of cyber attacks, what their goal is, and how to try to prevent these types of cyber attacks.

5
Anonymous Author
Very informative. Even being in the financial industry, and completing all the annual training, I learned quite a few new ways of hacking and cyber events.

5
Anonymous Author
Good explanation of all terms and examples, and useful refresh of more recent cases as well as historic cases indicating causes of these.

5
Member's Profile
Great overview of the topic. Liked the Ponemon Institute study to set the stage and concluding the course with practical actions.

5
Anonymous Author
i liked the statistics and information about the recent breaches and the cost / financial implications to the affected companies.

5
Anonymous Author
Another great course from Lynn - it is a little more technical than you would expect probably but very informative. Thank you!

4
Anonymous Author
Detailed slides and presentation on the various cyber threats and the processes in place to identify and mitigate threats.

5
Member's Profile
Well said and easy to follow. PowerPoint is laid out well and is easy to understand for beginners and professionals alike.

5
Anonymous Author
This is a refreshing course. It will will be beneficial to everyone regardless. Nothing surprised me from this training.

5
Member's Profile
I liked that the different types of attacks and real-life companies were used as examples of the threats out there.

4
Anonymous Author
The course was pretty basic and the instructor read a lot of the slides. It did convey some useful information.

5
Anonymous Author
A very informative course on Cyber Threats. I was surprised to learn how many data breaches there have been.

3
Anonymous Author
Good review of basic information. Presenter was obviously sick in the beginning and was rather distracting.

4
Anonymous Author
The course met my expectations for what the information is at present for corporate cyber security issues.

5
Anonymous Author
This is a good introductory overview to modern day fraud cyber breaches and actions for the average person

4
Member's Profile
This is course provides basic overview of cyber threats and is suitable for someone new to cyber security.

5
Anonymous Author
Very good introduction to several examples of breaches and their effect, and several types of malware.

4
Member's Profile
Course was presented in a understandable manner explaining many terms associated with the topic.

5
Anonymous Author
This is a very interesting course on cyber threat. The course material is very easy to comprehend

4
Anonymous Author
Good course ... but (now at the end of 2019) already getting dated. Time for a refresh/ update.

4
Anonymous Author
The slides were detailed enough that you could read them without listening to the presentation.

5
Anonymous Author
Great course, provided a vivid description about the spectrum of cyber risks, fraud and attack.

5
Anonymous Author
Excellent course on the basics of Cyber threats, recent breaches and current methods used.

4
Anonymous Author
Interesting course on data breaches and their impact, and there was great use of examples.

5
Member's Profile
An excellent non-technical overview and appreciation of the cyber threat landscape.

4
Member's Profile
Great overview of the intersection between Cyber Security and Fraud. Thank you!

5
Anonymous Author
good overview of the different types of breaches and some history of breaches

5
Member's Profile
Very clear definitions and explanations, east to follow and well presented.

4
Anonymous Author
Provided the required information to help understand cyber security issues

4
Anonymous Author
Great course of cyber threat - the modern-day fraud which added value

4
Anonymous Author
Thrilling list of cyber attacks plus overview of types of threats.

5
Anonymous Author
Good course. Good way to recollect and revise all the concepts.

4
Anonymous Author
Informative and up to date information on a complex topic.

5
Member's Profile
Gain helpful knowledge and the course was ease to follow.

5
Anonymous Author
Good course, well paced, good coverage of the topics.

5
Member's Profile
Great awareness training concerning security threats.

5
Member's Profile
Great summary of the main types of cyber attacks.

4
Anonymous Author
Very solid course to learn more about cyber threat.

Prerequisites
Course Complexity: Intermediate

No advanced preparation or prerequisites are required for this course.

Education Provider Information
Company: Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact: For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Instructor for this course
Course Syllabus
INTRODUCTION AND OVERVIEW
  Introduction to Cyber Threat – The Modern-Day Fraud: Breaches and Actions3:06
  Data Breaches and Impact17:07
  Largest Breaches of 21st Century (So Far)14:50
  Examples9:13
  State of Cyber Security9:37
  Types and Methods of Threats10:44
  Types of Attacks10:06
  Types of Attacks Cont'd11:12
  Cyber Threat Actions10:09
CONTINUOUS PLAY
  Cyber Threat – The Modern-Day Fraud: Breaches and Actions1:36:04
Supporting Materials
  Slides: Cyber Threat – The Modern-Day Fraud: Breaches and ActionsPDF
  Cyber Threat – The Modern-Day Fraud: Breaches and Actions Glossary/IndexPDF
REVIEW AND TEST
  REVIEW QUESTIONSquiz
 FINAL EXAMexam