• Online, Self-Paced
Course Description

Effective cybersecurity risk management requires intricate knowledge of day-to-day IT security risks, network vulnerabilities, and cyber attacks. In this course, you'll detail several cybersecurity breaches and how best to prevent each one.

You'll start with a general overview of what comprises security risks before categorizing different types into information, cloud, and data-related risks.

Next, you'll explore cybercrime methods, the motivations behind them, and the security gaps that invite them in. You'll then use real-life examples to detail some commonplace cyberattacks and crimes.

Moving on, you'll investigate what's meant by malware and outline best practices to manage worms, viruses, logic bombs, trojans, and rootkits.

You'll also learn how to safeguard against malware, spyware, ransomware, adware, phishing, zero-day vulnerabilities, DoS, and backdoor attacks.

By the end of the course, you'll be able to outline guidelines and best practices for securing against the most prevalent types of cybercrimes.

Learning Objectives

{"discover the key concepts covered in this course"}

Framework Connections