The Cyber Threat Landscape & Security Best Practices

Course curriculum

  • 1

    Cyber Threat Landscape

    • Phishing

    • Data Breach

    • Ransomware

    • Business Email Compromise

    • Insider Threat

  • 2

    Cybersecurity Best Practices 1

    • Asset Inventory

    • Passwords & Access Control

    • Patching & Vulnerability Management

    • Remote, Mobile & Endpoint Protection

  • 3

    Cybersecurity Best Practices 2

    • Network Security

    • Logging

    • Incident Response

    • Disaster Recovery

  • 4

    Governance Best Practices

    • Aligning Cybersecurity with Business Strategy

    • Incident Response Teams & Simulations

    • Focusing on Outcomes, not Controls

    • Walking the Talk