Description: This course covers how common threat sources actually get exploited. You will learn about social engineering, exploit kits, ransomware, and much more.
Target Audience: Individuals and organizations interested in improving security at all IT levels, and security auditors
Duration: 00:59
Description: In this course, potential security breach sources such as mobile and IoT devices are explained. Cyber insurance is becoming more common as companies seek to protect their IT systems.
Target Audience: Executives or IT staff seeking to identify common threat sources and their mitigations
Duration: 01:21