An Executive's Guide to Security: Understanding Security Threats


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Companies that do not understand threats facing their information are at risk of costly data breaches. In this 13-video course, learners can explore common security threats, types of network attacks, and the human element of security threats. Key concepts covered here include what an attack surface is, and how it must be understood to protect corporate information; and what network hardening is and how it relates to protection of corporate information. Next, learners will examine network demilitarized zones and how they protect corporate information; observe differences between threats, vulnerabilities, and risks in corporate environments; and study top kinds of security threats facing organizations today. Continue by learning the role that physical security plays in protecting corporate data; how social engineering is conducted and how it is mitigated through corporate policy; and the importance of corporate security policies, and why they should be strictly adhered to. Finally, explore the importance of password policies and why they should be adhered to; and learn reasons why IT administrators need to protect an organization by refusing to bend rules.



Expected Duration (hours)
0.8

Lesson Objectives

An Executive's Guide to Security: Understanding Security Threats

  • Course Overview
  • describe what an attack surface is and how it must be understood in order to protect corporate information
  • specify what network hardening is and how it relates to the protection of corporate information
  • discuss network demilitarized zones and how they help protect corporate information
  • describe the differences between threats, vulnerabilities, and risks in a corporate environment
  • specify the top kinds of security threats facing organizations today
  • discuss the common types of security attacks and how they each pose a risk to organizational data
  • describe the role physical security plays in the protection of corporate data
  • specify how social engineering is conducted and how it can be mitigated through corporate policy
  • discuss the importance of corporate security policies and why they should be strictly adhered to
  • describe the importance of password policies and why they should be adhered to
  • specify the reasons why IT administrators need to protect an organization by refusing to bend the rules
  • describe security threats, network hacks and attacks, and the human element in protecting organizational information
  • Course Number:
    it_spcsegdj_01_enus

    Expertise Level
    Beginner