Time
2 hours 43 minutes
Difficulty
Intermediate
CEU/CPE
2

Video Transcription

00:01
at the end of model to let's do a short recap at what you have learned,
00:06
units.
00:07
So ah, we're
00:10
we have been talking about Who are the people you are defending against?
00:16
Um, what are the threats?
00:19
What do they want
00:21
and how are they going to attack you? You're in points
00:26
classified by 10 points. So we talked about
00:30
all the classes off hackers of cyber criminals.
00:35
Uh, you learn that in most of the cases they just want money or some kind of monetary gain. It doesn't have to be your money exactly. But it will damage your financially anyway.
00:48
And that in very rare cases there, looking physically to damage you
00:53
in terms off, making your company non functional for a period of time or your website wherever they want to do
01:02
and is the ways of attacking they can attack you through mala where they can attack you from through. Ah, all sorts of females. Melber websites. They can just get your credential by using social engineering or look over your shoulder when you're in public space.
01:22
So basically there are many, many ways
01:25
in which they can get the information they need to successfully break through your defenses and you have to have all of that in might,
01:34
And this concludes the model, too.

Up Next

Endpoint Security Fundamentals

This course is about basics in Endpoint Security. In it, you will learn why endpoint security today is of such importance and basic terminology used in this field. Also, you will learn about threats that are existing today related to endpoints and what solutions and tools exist on the market that can help you defend from all kinds of attacks.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor