Common Cybersecurity Attacks and Defense Strategies

Bad actors are constantly hunting for your personal and proprietary information to use against you for their profit. Attacks are becoming more and more sophisticated, so you must learn to recognize their methods and start defending your cyberspace today. This course teaches you to recognize the most...

Full description

Bibliographic Details
Main Author: Gilbert, Lisa
Format: eBook
Language:English
Published: [Erscheinungsort nicht ermittelbar], Boston, MA EC-Council, Safari 2020
Edition:1st edition
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 01509nmm a2200229 u 4500
001 EB001996363
003 EBX01000000000000001159264
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210823 ||| eng
100 1 |a Gilbert, Lisa 
245 0 0 |a Common Cybersecurity Attacks and Defense Strategies  |c Gilbert, Lisa 
250 |a 1st edition 
260 |a [Erscheinungsort nicht ermittelbar], Boston, MA  |b EC-Council, Safari  |c 2020 
300 |a 1 video file, circa 1 hr., 22 min. 
653 |a Electronic videos ; local 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Online resource; Title from title screen (viewed August 20, 2020) 
856 4 0 |u https://learning.oreilly.com/videos/~/130320BCRV/?ar  |x Verlag  |3 Volltext 
082 0 |a 000 
520 |a Bad actors are constantly hunting for your personal and proprietary information to use against you for their profit. Attacks are becoming more and more sophisticated, so you must learn to recognize their methods and start defending your cyberspace today. This course teaches you to recognize the most common and most devastating attacks. Relevant, timely information is your best weapon against attackers; learn and understand the latest strategies that will be used against you. Armed with the knowledge to recognize the attacks, you will be prepared to defend against them. You will transform yourself and your personnel from your greatest vulnerability to your greatest asset in defending your cyberspace