New Training: Explain Common Threats Against On-premises and Cloud Environments
| new skills - Team Nuggets

New Training: Explain Common Threats Against On-premises and Cloud Environments

In this 9-video skill, CBT Nuggets trainer Knox Hutchinson breaks down key terms in the information security landscape. Watch this new Cisco training.

Watch the full course: Implementing and Operating Cisco Security Core Technologies

This training includes:

  • 9 videos
  • 40 minutes of training

You’ll learn these topics in this skill:

  • Introducing the Cybersecurity Landscape
  • Know Your Assets
  • Know Your Vulnerabilities
  • Know Your Threats
  • Virus, Trojan, and Malware.. Oh my!
  • Phishing and Social Engineering
  • DDoS – Attacking Availability
  • Spoofing and MitM Attacks
  • Summarizing the Threat Landscape

What Are Some Common Cybersecurity Threats Facing Organizations Today?

Today, organizations are in a constant battle to stay ahead of the various types of malicious software that are designed to gain entry, exploit, and often steal an organization's sensitive data. To meet this malicious goal of exploiting an organization's sensitive data, malicious software has taken various forms and exploitative strategies in an attempt to trick or outsmart an organization's security parameter. Today, there are tons of different identified security threats and types of malware; however, a few categories of malicious software stand out to be the most common classes of malicious software.

Ransomware is one of the most worrisome types of malicious software found in the cyber threat landscape today. The intention of ransomware is to stealthily encrypt an organization's sensitive data and backups such that if that organization were not to pay a ransom, the cyber attacker would make the data inaccessible forever.

A Trojan is a type of malicious software that poses as a legitimate piece of software; however, once the software is downloaded onto the host computer, the trojan will allow the software's malicious component to propagate within the organization's environment.

These two primary attack strategies only scrape the surface of the deep and complex cybersecurity landscape. By implementing a modernized cybersecurity posture, organizations can minimize these attack vectors' threats and others facing organizations today.

Download

Download

Ultimate Security Cert Guide

A 62-page guide to every Palo Alto, Offensive Security, (ISC)2, Check Point, CompTIA, and Cisco certification, and how they fit into your career.

By submitting this form you agree that you have read, understood, and are able to consent to our privacy policy.

LEARNING ON MOBILE

Learn anytime anywhere with our mobile apps.

I have read and understood the privacy policy and am able to consent to it.

© 2021 CBT Nuggets. All rights reserved. Terms | Privacy Policy | Accessibility | Sitemap | 1550 Valley River Drive, Eugene, OR 97401 | 541-284-5522
CBT Nuggets