Common types of attack /
Welcome to Audio Learning from Assemble You. Hackers conduct cyber attacks to steal information, sabotage one or more systems, or bring down a working network. They can also attack several systems at once, gain control, and use these systems to initiate another attack on a different network altogeth...
Clasificación: | Libro Electrónico |
---|---|
Formato: | Electrónico Audiom |
Idioma: | Inglés |
Publicado: |
[Place of publication not identified] :
Assemble You,
2022.
|
Edición: | [First edition]. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Sumario: | Welcome to Audio Learning from Assemble You. Hackers conduct cyber attacks to steal information, sabotage one or more systems, or bring down a working network. They can also attack several systems at once, gain control, and use these systems to initiate another attack on a different network altogether. In this track, we'll learn about social engineering, malware, ransomware, distributed denial of service, Man-in-the-middle (MITM) attacks, insider threats, credential reuse, and mobile attacks. Learning Objectives Learn about the most common threats to cyber security Learn the techniques to protect yourself against common attacks. |
---|---|
Descripción Física: | 1 online resource (1 sound file (12 min.)) |
Tiempo de Juego: | 00:13:00 |