Cybersecurity Threats, Vulnerabilities, and Attacks, Part 2
I haven't been posting a whole lot here on my blog.
I had completed two rather lengthy posts on my blog. It took a lot of effort to complete those two posts. There are additional lengthy posts in the pipeline.
Recently, I have been busy doing everything else except for posting to my blog.
One thing that I have been spending A LOT of time on is the Network Support and Security online class from Cisco Networking Academy.
For the past couple of weeks, I have been working my way through "Module 2: Cybersecurity Threats, Vulnerabilities, and Attacks". In fact, I wrote a post right here on my blog about beginning the second module of the Network Support and Security online class. You can read that post right here.
To say that my progress through the course has been slow is an understatement.
As I mentioned in a short post that I published on LinkedIn, I have already been exposed to a significant portion of the information about cybersecurity threats due to security briefings I had been given while in was in the Army, worked as a DoD contractor, and as an IT help desk employee at the Social Security Administration. However, it is a lot of information to absorb, so it is a good idea to review the nature of cyber attacks from time to time.
![]() |
Module 2.0 Introduction |
![]() |
Module 2.1 Common Threats |
![]() |
Module 2.2 Deception |
![]() |
Module 2.3 Cyber Attacks |
![]() |
Module 2.4 Wireless and Mobile Device Attacks |
No comments:
Post a Comment