Instructor for this course
more

Advancements in technology have raised the level of acknowledgement of threats in the cyber age. These threats touch both the business world and personal lives. Information technology is no longer a “back-office” function.  Once considered a process area that was solely part of the Chief Information Officer’s domain, companies must now acknowledge that whether the threats are internal or external, they are very real and can and will cause harm to many organizations in many ways.  As a result, it is imperative that professionals across the company understand and be prepared to deal with the multitude of ever-growing cyber threats.   

In this two-part series, we examine the landscape of cyber threats as they currently exist.  We take a look at the biggest incidents related to cyber security of the 21st century (so far).  We then delve into obtaining an understanding of the various threats that can impact our everyday lives, both business and personal.   Part two of this series will deal with a topic that has hit the boardroom and governance body agenda of almost all companies – Cyber Risk Management.  In part two we discuss the various cyber risk management frameworks available and how your organization can utilize them to be prepared for the inevitable.

Training for all programs related to cyber security by this trainer are utilizing the framework of the National Institute of Standards and Technology (NIST) as a model. This information is freely available in the public domain. For more detailed information on the framework please refer to NIST.org.

Learning Objectives

  • Explore the meaning and impact of data breaches.
  • Examine recent cyber incidents and their impact on business.
  • Identify types and methods of the most proliferate cyber threats.
  • Explore actions professionals and organizations can take towards prevention of cyber threats.
Last updated/reviewed: June 5, 2021

Included In Certifications

This course is included in the following Certification Programs:

12 CoursesCorporate Cyber Security Certification

  1. Cyber Threat – The Modern-Day Fraud: Breaches and Actions
  2. A Primer on Cyber Security Programs and Roles
  3. Cyber Risk Frameworks And Concepts
  4. Cyber Risk Framework - Identify Assets
  5. Cyber Risk Framework - Prioritize Assets
  6. Cyber Risk Framework - Protect Assets
  7. Cyber Risk Framework - Detect Part One
  8. Cyber Risk Framework - Detect Threats Part Two
  9. Cyber Risk Framework - Respond
  10. Cyber Risk Framework - Recover
  11. Cyber Risk Framework - Utilizing The Tier Approach
  12. Fraud and Personal Identity Theft

39 Reviews (155 ratings)Reviews

5
Member's Profile
Gain helpful knowledge and the course was ease to follow.
4
Anonymous Author
This course provides an overview and understanding of data breaches and the impact of data breaches. It explains many cyber incidents that occurred and their impact on businesses. It provides and explanation of the different methods by which cyber threats are proliferated, and tells us what we can do to prevent cyber threats.
5
Member's Profile
Interesting and scary!
4
Member's Profile
The sound level was good in this video. The material was good and the examples made the subject matter more interesting. The instructor wasn't monotone in this video and it was clear that she enjoyed the subject.
5
Anonymous Author
This course provides a comprehensive view of data breaches and the impact of it. Instructor uses real-world examples of data breach through the decades for highlighting the importance of cyber security nowadays.
4
Anonymous Author
I liked the examples of major breaches, although I would have preferred to hear about them after an overview of the specific tactics used. It was helpful to know the business impact of breaches.
5
Member's Profile
Examples of data breaches were interesting and concerning - definitely highlights the need for good cyber security practices. Supplementary slides and glossary also very helpful.
5
Anonymous Author
The course introduces you to the different types of cyber security threats - appropriate and necessary before taking the remainder of the courses required for certification.
4
Anonymous Author
a very comprehensive course which provides insights to cyber threats. great for risk managers, and auditors that don't have first hand understanding of these risks
4
Anonymous Author
..................................................................................................................................................................
4
Anonymous Author
Very interesting course, full of relevant terminology and real-life situations. Lynn Fountain again brings us helpful insight into the cyber security realm.
4
Anonymous Author
This course provides a good understanding of a variety of types of cyber attacks, what their goal is, and how to try to prevent these types of cyber attacks.
5
Anonymous Author
Good explanation of all terms and examples, and useful refresh of more recent cases as well as historic cases indicating causes of these.
4
Anonymous Author
Detailed slides and presentation on the various cyber threats and the processes in place to identify and mitigate threats.
5
Member's Profile
Well said and easy to follow. PowerPoint is laid out well and is easy to understand for beginners and professionals alike.
5
Member's Profile
I liked that the different types of attacks and real-life companies were used as examples of the threats out there.
5
Anonymous Author
A very informative course on Cyber Threats. I was surprised to learn how many data breaches there have been.
3
Anonymous Author
Good review of basic information. Presenter was obviously sick in the beginning and was rather distracting.
4
Anonymous Author
The course met my expectations for what the information is at present for corporate cyber security issues.
5
Anonymous Author
This is a good introductory overview to modern day fraud cyber breaches and actions for the average person
5
Anonymous Author
Very good introduction to several examples of breaches and their effect, and several types of malware.
4
Member's Profile
Course was presented in a understandable manner explaining many terms associated with the topic.
5
Anonymous Author
This is a very interesting course on cyber threat. The course material is very easy to comprehend
4
Anonymous Author
Good course ... but (now at the end of 2019) already getting dated. Time for a refresh/ update.
4
Anonymous Author
The slides were detailed enough that you could read them without listening to the presentation.
5
Anonymous Author
Great course, provided a vivid description about the spectrum of cyber risks, fraud and attack.
5
Anonymous Author
Excellent course on the basics of Cyber threats, recent breaches and current methods used.
4
Anonymous Author
Interesting course on data breaches and their impact, and there was great use of examples.
5
Member's Profile
An excellent non-technical overview and appreciation of the cyber threat landscape.
4
Member's Profile
Great overview of the intersection between Cyber Security and Fraud. Thank you!
5
Member's Profile
Very clear definitions and explanations, east to follow and well presented.
4
Anonymous Author
Provided the required information to help understand cyber security issues
4
Anonymous Author
Great course of cyber threat - the modern-day fraud which added value
4
Anonymous Author
Thrilling list of cyber attacks plus overview of types of threats.
5
Anonymous Author
Good course. Good way to recollect and revise all the concepts.
4
Anonymous Author
Informative and up to date information on a complex topic.
5
Anonymous Author
Good course, well paced, good coverage of the topics.
5
Member's Profile
Great summary of the main types of cyber attacks.
4
Anonymous Author
Very solid course to learn more about cyber threat.

Prerequisites

Course Complexity: Intermediate

No advanced preparation or prerequisites are required for this course.

Education Provider Information

Company:
Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact:
For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Course Syllabus
INTRODUCTION AND OVERVIEW
  3:06Introduction to Cyber Threat – The Modern-Day Fraud: Breaches and Actions
  17:07Data Breaches and Impact
  14:50Largest Breaches of 21st Century (So Far)
  9:13Examples
  9:37State of Cyber Security
  10:44Types and Methods of Threats
  10:06Types of Attacks
  11:12Types of Attacks Cont'd
  10:09Cyber Threat Actions
CONTINUOUS PLAY
  1:36:04Cyber Threat – The Modern-Day Fraud: Breaches and Actions
Supporting Materials
  PDFSlides: Cyber Threat – The Modern-Day Fraud: Breaches and Actions
  PDFCyber Threat – The Modern-Day Fraud: Breaches and Actions Glossary/Index
REVIEW AND TEST
  quizREVIEW QUESTIONS
 examFINAL EXAM