New Skills

New Training: Explain Common Threats Against On-premises and Cloud Environments

by Team Nuggets
New Training: Advanced BGP Foundations picture: A
Follow us
Published on March 2, 2021

In this 9-video skill, CBT Nuggets trainer Knox Hutchinson breaks down key terms in the information security landscape. Watch this new Cisco training.

Watch the full course: Implementing and Operating Cisco Security Core Technologies

This training includes:

  • 9 videos

  • 40 minutes of training

You’ll learn these topics in this skill:

  • Introducing the Cybersecurity Landscape

  • Know Your Assets

  • Know Your Vulnerabilities

  • Know Your Threats

  • Virus, Trojan, and Malware.. Oh my!

  • Phishing and Social Engineering

  • DDoS – Attacking Availability

  • Spoofing and MitM Attacks

  • Summarizing the Threat Landscape

What Are Some Common Cybersecurity Threats Facing Organizations Today?

Today, organizations are in a constant battle to stay ahead of the various types of malicious software that are designed to gain entry, exploit, and often steal an organization's sensitive data. To meet this malicious goal of exploiting an organization's sensitive data, malicious software has taken various forms and exploitative strategies in an attempt to trick or outsmart an organization's security parameter. Today, there are tons of different identified security threats and types of malware; however, a few categories of malicious software stand out to be the most common classes of malicious software.

Ransomware is one of the most worrisome types of malicious software found in the cyber threat landscape today. The intention of ransomware is to stealthily encrypt an organization's sensitive data and backups such that if that organization were not to pay a ransom, the cyber attacker would make the data inaccessible forever.

A Trojan is a type of malicious software that poses as a legitimate piece of software; however, once the software is downloaded onto the host computer, the trojan will allow the software's malicious component to propagate within the organization's environment.

These two primary attack strategies only scrape the surface of the deep and complex cybersecurity landscape. By implementing a modernized cybersecurity posture, organizations can minimize these attack vectors' threats and others facing organizations today.


Download

By submitting this form you agree to receive marketing emails from CBT Nuggets and that you have read, understood and are able to consent to our privacy policy.


Don't miss out!Get great content
delivered to your inbox.

By submitting this form you agree to receive marketing emails from CBT Nuggets and that you have read, understood and are able to consent to our privacy policy.

Recommended Articles

Get CBT Nuggets IT training news and resources

I have read and understood the privacy policy and am able to consent to it.

© 2024 CBT Nuggets. All rights reserved.Terms | Privacy Policy | Accessibility | Sitemap | 2850 Crescent Avenue, Eugene, OR 97408 | 541-284-5522