Cybersecurity Threats, Vulnerabilities, and Mitigations
7 H 57 M
Just you? Training a whole team? There's an ITProTV plan that fits.
Start Training TodayEpisodes
Episodes
- Course Overview
- Overview
- Threat Actors
- Threat Actors
- Threat Vectors and Attack Surfaces
- Social Engineering
- Business Email Compromise
- Digital System Threats
- Network Based Threats
- Removable Media Threats
- Supply Chain Attacks
- Security Vulnerabilities
- Application Vulnerabilities
- Operating System Vulnerabilities
- Web Based Vulnerabilities
- Hardware Vulnerabilities
- Cloud Vulnerabilities
- Virtualization Vulnerabilities
- Cryptographic Vulnerabilities
- Mobile Device Vulnerabilities
- Zero Day Vulnerabilities
- Malicious Activity
- Indicators of Malware Attacks
- Indicators of Physical Attacks
- Indicators of Network Attacks
- Indicators of Application Attacks
- Indicators of Crypographic Attacks
- Indicators of Password Attacks
- Mitigations
- Cybersecurity Mitigation Techniques
Overview
3 M



- Episode Description
- Transcript
In this episode, we will introduce our hosts and discuss the purpose and scope of this course.