Examine threat vectors and data breaches
This module examines the types of threat vectors and their potential outcomes that organizations must deal with on a daily basis and how users can enable hackers to access targets by unwittingly executing malicious content.
Describe techniques hackers use to compromise user accounts through email., Describe techniques hackers use to gain control over resources., Describe techniques hackers use to compromise data., Mitigate an account breach., Prevent an elevation of privilege attack., Prevent data exfiltration, data deletion, and data spillage.
Prerequisites
There are no reviews yet.