• Online, Self-Paced
Course Description

In this course, potential security breach sources such as mobile and IoT devices are explained. Cyber insurance is becoming more common as companies seek to protect their IT systems.

Learning Objectives

Attack Vectors

  • start the course
  • describe how the prevalence of mobile devices has created a whole new platform for vulnerabilities
  • list the pros and cons that can arise from a BYOD environment in a workplace
  • specify how outsourcing IT can affect the overall security of a business
  • specify how more and more everyday devices becoming Internet connected can have negative effects on security
  • describe how wearables and other nontraditional platforms being connected can raise security concerns

Protecting IT Systems

  • recognize why TLS is becoming more prevalent and why its use is recommended
  • protect stored data with encryption
  • specify how insecure databases can lead to large data leaks
  • describe why putting data in the cloud can be useful and some ways to secure it
  • enable encryption to protect cloud data at rest
  • determine how DLP can secure digital assets
  • identify why multi-factor authentication has come into common use and its benefits
  • secure cloud user accounts with MFA
  • describe how Single Sign-On can be used to improve security
  • recognize how organizations are beginning to protect themselves from IT attacks

Practice: General Threat Sources

  • list common sources of security breaches and how to protect against them

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Investigation
  • Cyber Defense Analysis
  • Cyber Defense Infrastructure Support
  • Cybersecurity Management
  • Exploitation Analysis
  • Vulnerability Assessment and Management