What is cyber security and why it matters

The CIA triad: the foundational principles

Threats, motives, and types of cyber crime

Who’s on the other side: types of hackers

Common attack types

Business scenario and a quick quiz

Answer: This is computer as the target. The systems themselves were attacked and infected by malware, causing service disruptions.

Short history of cyber crime

How cyber security works: essential controls

Who is a cyber security expert and what do they do?

Domains within cyber security

Courses and certifications worth considering

Key takeaways

Next steps

TIME BUSINESS NEWS

JS Bin