Common types of attack

Welcome to Audio Learning from Assemble You. Hackers conduct cyber attacks to steal information, sabotage one or more systems, or bring down a working network. They can also attack several systems at once, gain control, and use these systems to initiate another attack on a different network altogeth...

Full description

Bibliographic Details
Corporate Author: Assemble You
Format: eBook
Language:English
Published: [Place of publication not identified] Assemble You 2022
Edition:[First edition]
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Description
Summary:Welcome to Audio Learning from Assemble You. Hackers conduct cyber attacks to steal information, sabotage one or more systems, or bring down a working network. They can also attack several systems at once, gain control, and use these systems to initiate another attack on a different network altogether. In this track, we'll learn about social engineering, malware, ransomware, distributed denial of service, Man-in-the-middle (MITM) attacks, insider threats, credential reuse, and mobile attacks. Learning Objectives Learn about the most common threats to cyber security Learn the techniques to protect yourself against common attacks
Physical Description:1 sound file (12 min.)