back

Cybersecurity Threats, Vulnerabilities, and Mitigations

7 H 57 M

Just you? Training a whole team? There's an ITProTV plan that fits.

Start Training Today
Episodes
Episodes
  • Course Overview
    • Overview
  • Threat Actors
    • Threat Actors
  • Threat Vectors and Attack Surfaces
    • Social Engineering
    • Business Email Compromise
    • Digital System Threats
    • Network Based Threats
    • Removable Media Threats
    • Supply Chain Attacks
  • Security Vulnerabilities
    • Application Vulnerabilities
    • Operating System Vulnerabilities
    • Web Based Vulnerabilities
    • Hardware Vulnerabilities
    • Cloud Vulnerabilities
    • Virtualization Vulnerabilities
    • Cryptographic Vulnerabilities
    • Mobile Device Vulnerabilities
    • Zero Day Vulnerabilities
  • Malicious Activity
    • Indicators of Malware Attacks
    • Indicators of Physical Attacks
    • Indicators of Network Attacks
    • Indicators of Application Attacks
    • Indicators of Crypographic Attacks
    • Indicators of Password Attacks
  • Mitigations
    • Cybersecurity Mitigation Techniques

Overview

3 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description
  • Transcript

In this episode, we will introduce our hosts and discuss the purpose and scope of this course.

WEBVTT >> Welcome and thanks for joining us for this overview. This course is called Cybersecurity Threats, Vulnerabilities, and Mitigation. I'm Sophie Goodwin. I'm going to be your host for this course. You may have seen me hosting some other courses here on ACI learning, some other cybersecurity type courses. I did recently obtain my first cybersecurity certification, certified in cybersecurity, so I'm excited about that. I'm going to be hosting this course, acting as a learner advocate, asking questions along the way that you might have at home. >> I'll be alongside Daniel Lowry, our subject matter expert. Tell us a little bit about yourself, Daniel. Well, thank you for that introduction, Sophie. I'm glad to be here and glad to have you here as well. I will be your subject matter expert. My name is Daniel Lowry. I've been working in IT for over 20 years now, and the last almost 10 or so years being specifically in cybersecurity. I do hold some industry certifications as well. I typically am in the red team game, the offensive security portion of things, and that's why I think I'm probably the best candidate here to give you this course, which is a lot of fun. I'm really looking forward to having a good time and teaching you good folks some interesting and useful cybersecurity skills. I can vouch for Daniel. It's very fun to learn from Daniel, so you're going to have a great time. >> So for people that are looking to get into this course, is there any experience or knowledge they should have beforehand? >> Other than general IT knowledge, this would probably be a very helpful understanding of Windows, Linux operating systems, maybe not to the administrative extent, but at least some familiarity with that so that some of these concepts don't go over your head, because we will be focusing on cybersecurity skills, those vulnerabilities that are wrapped around operating systems, networks, and that kind of stuff. So understanding some operating system detail and even networking detail is going to be super helpful for you, not going to make or break you, but it will definitely lend to some helpful baseline knowledge foundationally as we start talking about these cybersecurity topics. - >> And then what do we have to look forward to in this course? What's the target audience, if you will? - >> Target audience is someone that says, "You know what? I like IT, but that cybersecurity stuff seems really interesting. I want to learn more about it." And you want to get those foundational skills, knowledges, terms, techniques, all that other fun stuff under your belt. I want to learn about those things. What are the things that hackers are doing to try to make their way into our systems? And what can we do to kind of stop that from occurring? What are the my options on the table? Can you help me understand better those techniques, the tools that are being used to employ those techniques and how they can affect an organization? That's what we're here to do today. And that's what you can expect from this course. - Well, >> I'm looking forward to this, because I know you've been in IT cybersecurity for several years. This is my second year. So I'm still relatively new to this, getting my toes wet, and I'm very excited to jump into this course. So I think that's going to do it for this overview. Thank you for telling us a little about yourself and about this course. And thank you for joining us. We'll see you in the course. (upbeat music)