25.8.0
This website uses cookies to ensure you get the best experience on our website. Learn more

Attack Vectors & Mitigations

Justine Eremugo

Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. Cyber insurance is becoming more common as companies seek to protect their IT systems. During this course, you will explore potential security breach sources such as mobile and IoT devices. Topics include the pros and cons of workplace Bring Your Own Device (BYOD) policies; the risks of outsourcing your IT; how internet-connected devices, including wearable gadgets, may present security risks. You will also discover how Transport Layer Security (TLS) plays a key role, and learn how to protect stored data with encryption, such as BitLocker. As you progress through the course, you will explore how insecure databases can leak data; and learn how to evaluate cloud data security options, Data Loss Prevention (DLP), Multi-factor Authentication (MFA), cloud MFA, Single Sign-On (SSO), Identity Federation, and cyber insurance. You will conclude by listing common sources of security breaches and how to protect against them.

Issued on

January 13, 2021

Expires on

Does not expire