From the course: Cybersecurity Fundamentals for IT Technicians by Pearson
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Threats and vulnerabilities
From the course: Cybersecurity Fundamentals for IT Technicians by Pearson
Threats and vulnerabilities
This lesson, we're going to cover some of the different threats and vulnerabilities that are out there from a cybersecurity perspective. The first one we're going to cover is ransomware. Ransomware encrypts the drives that you have in your computers and demands some sort of ransom. And unfortunately, it means it doesn't typically do it to just one or two computers. It's either widespread across a ton of computers or it hits some of the servers that you have and it hits your data and you just can't get that information back without either rebuilding from a backup or paying that ransom. Now unfortunately, when you think about ransomware, a lot of times folks will pay it and you will not get your data back because it's Bitcoin. Most of the stuff is paid via Bitcoin, it's very, very difficult to track who it belongs to and how much it was even involved with, and at that point you're just in a really, really bad place. So if you do get hit with ransomware, I highly recommend you talk to…
Contents
-
-
-
(Locked)
Module introduction1m 6s
-
(Locked)
Learning objectives3m 16s
-
(Locked)
Understanding common threats, investigation tools and processes7m 55s
-
(Locked)
Cybersecurity best practices8m 45s
-
(Locked)
Threats and vulnerabilities12m 40s
-
(Locked)
How to scan for and detect malware5m 40s
-
(Locked)
Password hygiene and best practices4m 43s
-
(Locked)
Social engineering, impersonation techniques, and avoidance7m 40s
-
(Locked)
Protecting sensitive data and personally identifiable information (PII)4m 44s
-
(Locked)