The Cyber Threat Landscape & Security Best Practices
Course curriculum
-
-
Phishing
-
Data Breach
-
Ransomware
-
Business Email Compromise
-
Insider Threat
-
-
-
Asset Inventory
-
Passwords & Access Control
-
Patching & Vulnerability Management
-
Remote, Mobile & Endpoint Protection
-
-
-
Network Security
-
Logging
-
Incident Response
-
Disaster Recovery
-
-
-
Aligning Cybersecurity with Business Strategy
-
Incident Response Teams & Simulations
-
Focusing on Outcomes, not Controls
-
Walking the Talk
-
About this course
- Free
- 17 lessons
- 0 hours of video content