Cyber threats loom heavy in today’s digital world. Threats impact individuals and businesses. Due to the vast number of always-connected mobile devices and laptops, the ease of data access results in boundless opportunities for unauthorized access to important data. Along with those opportunities come modern-day threats to businesses and individuals from not only a financial perspective but also operational and compliance perspectives.

Over the past decade, the cybersecurity field has become increasingly significant due to the increased reliance on computer systems, the Internet, and wireless networks such as Bluetooth and Wi-Fi. In addition, the onset of COVID in 2020 forced the maturity of information technology simply because organizations required technology to continue their business. Advancements in information technology also resulted in significant impact to cybersecurity protocols. The growth in “smart” devices and their use in our everyday lives have created constant digital threats. As such, issues surrounding cybersecurity has become one of the biggest “fraud” schemes of our age.

The focus on technology is evident in all aspects of our lives. It extends from the use of household convenience technology such as Siri to the most sophisticated aspects of the cloud. Each day, cybersecurity continues to evolve. Advancements in technology have raised the level of acknowledgment for technology threats by both individuals as well as companies. Professionals must stay abreast of the ever-expanding threats posed by our technological age. Whether the threats are internal or external, they are very real and will cause harm to your organization in numerous ways.

This course serves as an introduction to the area of cybersecurity. Within this course we define concepts and terms, we evaluate the types of breaches and examine the current state of cybersecurity.

Learning Objectives
  • Discover and define the concepts of cybersecurity including terms and definitions.
  • Explore the meaning and impact of cyber breaches and threats.
  • Identify and understand the state of cybersecurity.
  • Explore and examine the types of breaches.
  • Explore current top cyber security threats.
  • Identify elements of a cyber program.
Last updated/reviewed: January 6, 2023
5 Reviews (25 ratings)


Anonymous Author
With the amount of computer and data risks that are out there today, it is important to really be knowledgeable about cyber risk. There are so many exploits out there that we need to really understand what to be on the lookout for.

Anonymous Author
Always amazed at the potential for problems in the computer world. Very informative from a business and personal perspective .

Anonymous Author
Great course. This is such a hot topic and we are constantly battling various hacks. I appreciate the learning in this class.

Anonymous Author
This is a great course on Cybersecurity. I liked the definitions and examples.

Member's Profile
Good course. Some additional real world examples would be great.

Course Complexity: Foundational
No advanced preparation or prerequisites are required for this course.
Education Provider Information
Company: Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact: For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Instructor for this course
Course Syllabus
  Introduction to Cybersecurity (Text Based Course)PDF