Instructor for this course
more

Advancements in technology have raised the level of acknowledgement of threats in the cyber age. These threats touch both the business world and personal lives. Information technology is no longer a “back-office” function.  Once considered a process area that was solely part of the Chief Information Officer’s domain, companies must now acknowledge that whether the threats are internal or external, they are very real and can and will cause harm to many organizations in many ways.  As a result, it is imperative that professionals across the company understand and be prepared to deal with the multitude of ever-growing cyber threats.   

In this two-part series, we examine the landscape of cyber threats as they currently exist.  We take a look at the biggest incidents related to cyber security of the 21st century (so far).  We then delve into obtaining an understanding of the various threats that can impact our everyday lives, both business and personal.   Part two of this series will deal with a topic that has hit the boardroom and governance body agenda of almost all companies – Cyber Risk Management.  In part two we discuss the various cyber risk management frameworks available and how your organization can utilize them to be prepared for the inevitable.

Learning Objectives

  • Explore the meaning and impact of data breaches.
  • Examine recent cyber incidents and their impact on business.
  • Identify types and methods of the most proliferate cyber threats.
  • Explore actions professionals and organizations can take towards prevention of cyber threats.
Last updated/reviewed: April 10, 2018

Included In Certifications

This course is included in the following Expert Certifications:

13 CoursesCorporate Cyber Security Certification

  1. Cyber Threat – The Modern-Day Fraud: Breaches and Actions
  2. A Primer on Cyber Security Programs and Roles
  3. Cyber Risk Management Frameworks and Concepts
  4. Cyber Risk Assessment - Identify Critical Assets
  5. Cyber Risk Assessment – Prioritize Assets for Protection
  6. Cyber Risk Assessment - Protect Assets from Threats
  7. Cyber Risk Assessment – Detect Threats Part One
  8. Cyber Risk Assessment – Detect Threats Part Two
  9. Cyber Risk Assessment – Respond to Incidents
  10. Cyber Risk Assessment – Recover from Incidents
  11. Measuring Cyber Risk Utilizing Tiers
  12. Personal Identity Theft
  13. The Business Identity Theft Crisis

6 Reviews (20 ratings)Reviews

4
Anonymous Author
Detailed slides and presentation on the various cyber threats and the processes in place to identify and mitigate threats.
5
Member's Profile
I liked that the different types of attacks and real-life companies were used as examples of the threats out there.
5
Anonymous Author
Very good introduction to several examples of breaches and their effect, and several types of malware.
4
Member's Profile
Course was presented in a understandable manner explaining many terms associated with the topic.
5
Member's Profile
An excellent non-technical overview and appreciation of the cyber threat landscape.
4
Anonymous Author
Thrilling list of cyber attacks plus overview of types of threats.

Prerequisites

Course Complexity: Intermediate

No advanced preparation or prerequisites are required for this course.

Education Provider Information

Company:
Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact:
For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Course Syllabus
INTRODUCTION AND OVERVIEW
  3:06Introduction to Cyber Threat – The Modern-Day Fraud: Breaches and Actions
  9:27Data Breaches and Impact
  12:30Largest Breaches of 21st Century (So Far)
  9:13Examples
  7:16State of Cyber Security
  10:43Types and Methods of Threats
  10:05Types of Attacks
  11:11Types of Attacks Cont'd
  10:08Cyber Threat Actions
CONTINUOUS PLAY
  1:23:40Cyber Threat – The Modern-Day Fraud: Breaches and Actions
Supporting Materials
  PDFSlides: Cyber Threat – The Modern-Day Fraud: Breaches and Actions
  PDFCyber Threat – The Modern-Day Fraud: Breaches and Actions Glossary/Index
REVIEW AND TEST
  quizREVIEW QUESTIONS
 examFINAL EXAM