From the course: Cybersecurity Fundamentals for IT Technicians by Pearson
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Understanding common threats, investigation tools and processes
From the course: Cybersecurity Fundamentals for IT Technicians by Pearson
Understanding common threats, investigation tools and processes
In this lesson, we're going to talk about an introduction to cybersecurity and why is it so important. We're going to cover things like what is cybersecurity? Why is it so necessary? Who cares? We need to know. We're also going to have to cover what you can do to be better protected because it's not a one and done thing. This is a way of life. So how do we think about security in our environment to make sure that whatever we're doing is got the best practice and the best hygiene from a password perspective? If you see something going on, say something. If you see someone doing things that are not necessarily approved, or they're doing something nefarious, please report it, please report it. It's not a joke when somebody gets their credentials stolen or somebody gets in and their files are deleted or their computer gets locked down and you have to pay millions of dollars worth of ransom to try to get their files back. It's not cool. If you see it, say something. It's very much like…
Contents
-
-
-
(Locked)
Module introduction1m 6s
-
(Locked)
Learning objectives3m 16s
-
(Locked)
Understanding common threats, investigation tools and processes7m 55s
-
(Locked)
Cybersecurity best practices8m 45s
-
(Locked)
Threats and vulnerabilities12m 40s
-
(Locked)
How to scan for and detect malware5m 40s
-
(Locked)
Password hygiene and best practices4m 43s
-
(Locked)
Social engineering, impersonation techniques, and avoidance7m 40s
-
(Locked)
Protecting sensitive data and personally identifiable information (PII)4m 44s
-
(Locked)