Instructor for this course

Advancements in technology have raised the level of acknowledgement of threats in the cyber age. These threats touch both the business world and personal lives. Information technology is no longer a “back-office” function.  Once considered a process area that was solely part of the Chief Information Officer’s domain, companies must now acknowledge that whether the threats are internal or external, they are very real and can and will cause harm to many organizations in many ways.  As a result, it is imperative that professionals across the company understand and be prepared to deal with the multitude of ever-growing cyber threats.   

In this two-part series, we examine the landscape of cyber threats as they currently exist.  We take a look at the biggest incidents related to cyber security of the 21st century (so far).  We then delve into obtaining an understanding of the various threats that can impact our everyday lives, both business and personal.   Part two of this series will deal with a topic that has hit the boardroom and governance body agenda of almost all companies – Cyber Risk Management.  In part two we discuss the various cyber risk management frameworks available and how your organization can utilize them to be prepared for the inevitable.

Learning Objectives

  • Explore the meaning and impact of data breaches.
  • Examine recent cyber incidents and their impact on business.
  • Identify types and methods of the most proliferate cyber threats.
  • Explore actions professionals and organizations can take towards prevention of cyber threats.
Last updated/reviewed: October 18, 2018

Included In Certifications

This course is included in the following Certification Programs:

13 CoursesCorporate Cyber Security Certification

  1. Cyber Threat – The Modern-Day Fraud: Breaches and Actions
  2. A Primer on Cyber Security Programs and Roles
  3. Cyber Risk Management Frameworks and Concepts
  4. Cyber Risk Assessment - Identify Critical Assets
  5. Cyber Risk Assessment – Prioritize Assets for Protection
  6. Cyber Risk Assessment - Protect Assets from Threats
  7. Cyber Risk Assessment – Detect Threats Part One
  8. Cyber Risk Assessment – Detect Threats Part Two
  9. Cyber Risk Assessment – Respond to Incidents
  10. Cyber Risk Assessment – Recover from Incidents
  11. Measuring Cyber Risk Utilizing Tiers
  12. Personal Identity Theft
  13. The Business Identity Theft Crisis

10 Reviews (40 ratings)Reviews

Member's Profile
Interesting and scary!
Anonymous Author
The course introduces you to the different types of cyber security threats - appropriate and necessary before taking the remainder of the courses required for certification.
Anonymous Author
Detailed slides and presentation on the various cyber threats and the processes in place to identify and mitigate threats.
Member's Profile
I liked that the different types of attacks and real-life companies were used as examples of the threats out there.
Anonymous Author
Good review of basic information. Presenter was obviously sick in the beginning and was rather distracting.
Anonymous Author
Very good introduction to several examples of breaches and their effect, and several types of malware.
Member's Profile
Course was presented in a understandable manner explaining many terms associated with the topic.
Member's Profile
An excellent non-technical overview and appreciation of the cyber threat landscape.
Anonymous Author
Provided the required information to help understand cyber security issues
Anonymous Author
Thrilling list of cyber attacks plus overview of types of threats.


Course Complexity: Intermediate

No advanced preparation or prerequisites are required for this course.

Education Provider Information

Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Course Syllabus
  3:06Introduction to Cyber Threat – The Modern-Day Fraud: Breaches and Actions
  9:27Data Breaches and Impact
  12:30Largest Breaches of 21st Century (So Far)
  7:16State of Cyber Security
  10:43Types and Methods of Threats
  10:05Types of Attacks
  11:11Types of Attacks Cont'd
  10:08Cyber Threat Actions
  1:23:40Cyber Threat – The Modern-Day Fraud: Breaches and Actions
Supporting Materials
  PDFSlides: Cyber Threat – The Modern-Day Fraud: Breaches and Actions
  PDFCyber Threat – The Modern-Day Fraud: Breaches and Actions Glossary/Index