Instructor for this course
more

“Your data may have been breached.”  It seems like that is a headline on an all too frequent basis.  These attacks can be avoided.  In this course we will discuss technologies that can be implemented to effectively prevent hacking attempts, viruses and phishing attempts from becoming a disastrous event.

This course helps you learn the meaning of key terminology and some tools and techniques that can be implemented to mitigate the risk associated with viruses, hacking attempts and phishing schemes. We delve into how attacks work and technology that can be implemented for prevention.  Lastly, we discuss simple controls that can be implemented, critical monitoring that should be performed, and important training that needs to occur.

Learning Objectives

  • Discover controls/processes to prevent breaches from occurring. 
  • Discover how data breaches have occurred.
  • Recognize the differences among various types of protection products.
  • Discover the technology utilized to protect organizations.
  • Explore how to map security controls to the National Institute of Standards and Technology (NIST) Cybersecurity Control Framework.
Last updated/reviewed: June 11, 2018

3 Reviews (9 ratings)Reviews

5
Anonymous Author
Very easy to understand the main points presentation.
3
Anonymous Author
Good information. Liked knowing how the big data breaches happened. May have enjoyed the course more if not reading directly from the slides.
5
Member's Profile
Good high-level ovreview; also good to review some basic terminology

Prerequisites

Course Complexity: Intermediate

No advanced preparation or prerequisites are required for this course.

Education Provider Information

Company:
Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact:
For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Course Syllabus
INTRODUCTION AND OVERVIEW
  5:51Introduction to Protect Your Data from Hackers, Virus and Phishing Schemes
  8:37Preventing a Data Breach
  6:34Preventing a Data Breach Continued..
  9:14The Biggest Data Breaches
  7:59The Biggest Data Breaches Continued..
  13:53Cyber Security Framework
  3:20Cyber Security Framework Continued and Conclusion
CONTINUOUS PLAY
  55:28Protect Your Data from Hackers, Virus and Phishing Schemes
Supporting Materials
  PDFSlides: Protect Your Data from Hackers, Virus and Phishing Schemes
  PDFProtect Your Data from Hackers, Virus and Phishing Schemes Glossary/Index
REVIEW AND TEST
  quizREVIEW QUESTIONS
 examFINAL EXAM