Description
This course will be an overview of:
- The history of cybercrime.
- A review of internal and external cyber threats.
- Common cyber red flags.
- Strategies to protect your organization from a cyber attack.
- How cybercrime markets operate.
After completing this course, the learner should be able to:
- Understand the history of cybercrime.
- Define and identify examples of internal cyber threats.
- Define and identify examples of external cyber threats.
- Identify cyber risk red flags.
- Discuss strategies to combat cyber attacks.
- Understand how cybercrime channels operate and their motivations.
Reviews
There are no reviews yet.