Cyber Criminals and Their Attacks
Attackers on the internet have different motivations. This course will teach you about the different types of threats to systems and data, and how you can avoid falling for an attacker’s tricks.
Cyber-attackers have many different goals and ways of attacking you. In this course, Cyber Criminals and Their Attacks, you’ll learn to protect yourself against the different types of attackers. First, you’ll explore the different types of cyber-attackers and what motivates them. Next, you’ll discover how criminals trick you into sending them your money. Finally, you’ll learn how to determine what attackers you will face at home and at work. When you’re finished with this course, you’ll have the skills and knowledge of cybersecurity needed to recognize common criminal attacks.
Author Name: John Elliott
Author Description:
John Elliott is a specialist in regulated security and data protection. His fascination is the way that people engage with security directives: whether that’s a company following external regulation, an information security team developing policies, an IT team following them, or a colleague who is just trying to do their job securely. John has led information security and data protection functions in aviation and financial services. He’s represented both Visa Europe and Mastercard on the PCI S… more
There are no reviews yet.