Section 1Introduction to the Course
Section 1.0Introduction to the CourseFree Preview
Learning Objectives
- What lies ahead
- The shift in how we live and work
- Speak the language
- What’s at stake
- In-depth familiarity with layers
Section 1.1Daily Use of Cyber
Section 1.2Cyber Definitions
Section 1.3Why Can't We Just Unplug?
Section 1.4Layers to Security
Section 2Cyber risk questions
Section 2.0Cyber risk questions
Section 2.1Moving into The Cloud
Section 2.2Proactive IT conversations
Section 3Security applications & appliances
Section 3.0Security applications & appliances
Section 3.1Today’s largest threat: malware
Section 3.2What if hardware fails?
Section 3.3Blockchain: the future
Section 3.4Prevent & minimize breaches
Section 3.5Questions to ask now
Section 4Cybersecurity policies and procedures
Section 4.0Policy vs. procedure
Section 4.1Resumption planning
Section 4.2Risk iceberg
Section 4.3Risk assessment & email
Section 4.4Offensive security
Section 5Regulations that govern technology
Section 5.0Regulations governing tech
Section 5.1Ensure compliance
Section 5.2An active breach
Section 5.3Post breach: what now?
Section 5.4Cyber culture/Q&A
Section 6Let’s review cybersecurity basics
Section 6.0Course summary
Section 6.1Survey: your feedback