Description: This course covers how common threat sources actually get exploited. You will learn about social engineering, exploit kits, ransomware, and much more.

Target Audience: Individuals and organizations interested in improving security at all IT levels, and security auditors

Duration: 00:59

Description: In this course, potential security breach sources such as mobile and IoT devices are explained. Cyber insurance is becoming more common as companies seek to protect their IT systems.

Target Audience: Executives or IT staff seeking to identify common threat sources and their mitigations

Duration: 01:21