Description |
1 online resource (1 sound file (12 min.)) |
Summary |
Welcome to Audio Learning from Assemble You. Hackers conduct cyber attacks to steal information, sabotage one or more systems, or bring down a working network. They can also attack several systems at once, gain control, and use these systems to initiate another attack on a different network altogether. In this track, we'll learn about social engineering, malware, ransomware, distributed denial of service, Man-in-the-middle (MITM) attacks, insider threats, credential reuse, and mobile attacks. Learning Objectives Learn about the most common threats to cyber security Learn the techniques to protect yourself against common attacks |
Notes |
Online resource; title from title details screen (O'Reilly, viewed July 26, 2022) |
Subject |
Cyberterrorism.
|
|
Computer security.
|
|
National security.
|
|
Computer security.
|
|
Cyberterrorism.
|
|
National security.
|
Genre/Form |
Audiobooks.
|
|
Audiobooks.
|
Form |
Streaming audio
|
Author |
Assemble You, publisher
|
|