Loading…

Common types of attack /

Welcome to Audio Learning from Assemble You. Hackers conduct cyber attacks to steal information, sabotage one or more systems, or bring down a working network. They can also attack several systems at once, gain control, and use these systems to initiate another attack on a different network altogeth...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Format: Electronic Audio
Language:Inglés
Published: [Place of publication not identified] : Assemble You, 2022.
Edition:[First edition].
Subjects:
Online Access:Texto completo (Requiere registro previo con correo institucional)
Description
Summary:Welcome to Audio Learning from Assemble You. Hackers conduct cyber attacks to steal information, sabotage one or more systems, or bring down a working network. They can also attack several systems at once, gain control, and use these systems to initiate another attack on a different network altogether. In this track, we'll learn about social engineering, malware, ransomware, distributed denial of service, Man-in-the-middle (MITM) attacks, insider threats, credential reuse, and mobile attacks. Learning Objectives Learn about the most common threats to cyber security Learn the techniques to protect yourself against common attacks.
Physical Description:1 online resource (1 sound file (12 min.))
Playing Time:00:13:00