Course CST200: Introducing Cybersecurity

Digital Transformation is reality for our world. It is evolving at an unprecedented rate, disrupting all our habits. It becomes imperative to understand digital phenomena in order to adapt to them and thus to avoid the pitfalls that can create prejudices in all our activities, not loosing all the way. We will discuss the different aspects of digital within their scope.

Target Audience:  Students, professionals and anyone intrested in Cyber security.

What you are going to learn?

  1. Understanding the digital age

  2. Understand some practical cases of digital

  3. Security analysis of different digital domains

  4. Digital work opportunity

  5. Understanding the vectors of cybersecurity attacks

  6. Understanding the cybersecurity defense system

 

Module 1: Digital Definition

1
Definitions and Introductions

Module 2: Understanding type of digital

1
Digital types

Module 3: Digital Use Cases scenario

1
Notable cases of digital

Quiz 1: Answer all questions to continue

1
Digital Past 3 Modules Quiz
5 questions

Module 4: Digital Attack Vector

1
What is a Digital attack vectore and which are common

Module 5: Security and Defense

1
Deep look

Quiz 2

1
Final Assement Quiz
7 questions
Common cyber attack vectors used by adversaries are: Compromised Credentials Weak and Stolen Credentials Ransomware Phishing Zero-Day Vulnerabilities Missing or Poor Encryption Misconfiguration Trust Relationships Zero-day vulnerabilities Brute force attack Distributed Denial of Service (DDoS)
Attack vectors are the methods that adversaries use to breach or infiltrate your network. Attack vectors take many different forms, ranging from malware and ransomware, to man-in-the-middle attacks, compromised credentials, and phishing. Some attack vectors target weaknesses in your security and overall infrastructure, others target weaknesses in the humans that have access to your network.
Your attack surface is represented by all of the points on your network where an adversary can attempt to gain entry to your information systems. Basically, any technique that a human can use to gain unauthorized access to your company’s data via any asset. For a medium to large sized enterprise, the attack surface can be gigantic. Hundreds of thousands of assets potentially targeted by hundreds of attack vectors can mean that your attack surface is made up of tens of millions to hundreds of billions of signals that must be monitored at all times If you consider a graph, where the x-axis lists all of the devices and apps on your network (infrastructure, apps, endpoints, IoT, etc.) and the y-axis are the different breach methods such as weak and default passwords, reused passwords, phishing, social engineering, unpatched software, misconfigurations etc. – the plot is your attack surface.

Be the first to add a review.

Please, login to leave a review
Course CST200: Introducing Cybersecurity
Price:
Free