Sunday, September 8, 2024

Cybersecurity Threats, Vulnerabilities, and Attacks, Part 2...

Cybersecurity Threats, Vulnerabilities, and Attacks, Part 2

I haven't been posting a whole lot here on my blog.

I had completed two rather lengthy posts on my blog. It took a lot of effort to complete those two posts. There are additional lengthy posts in the pipeline.

Recently, I have been busy doing everything else except for posting to my blog.

One thing that I have been spending A LOT of time on is the Network Support and Security online class from Cisco Networking Academy.

For the past couple of weeks, I have been working my way through "Module 2: Cybersecurity Threats, Vulnerabilities, and Attacks". In fact, I wrote a post right here on my blog about beginning the second module of the Network Support and Security online class. You can read that post right here.

To say that my progress through the course has been slow is an understatement.

As I mentioned in a short post that I published on LinkedIn, I have already been exposed to a significant portion of the information about cybersecurity threats due to security briefings I had been given while in was in the Army, worked as a DoD contractor, and as an IT help desk employee at the Social Security Administration. However, it is a lot of information to absorb, so it is a good idea to review the nature of cyber attacks from time to time.

Module 2.0 Introduction
Module 2.0 Introduction

Module 2.1 Common Threats
Module 2.1 Common Threats

Module 2.2 Deception
Module 2.2 Deception

Module 2.3 Cyber Attacks
Module 2.3 Cyber Attacks

Module 2.4 Wireless and Mobile Device Attacks
Module 2.4 Wireless and Mobile Device Attacks

I just started working on "Module 2.5 Application Attacks". It is the last section for Module 2:  Cybersecurity Threats, Vulnerabilities, and Attacks

Module 2.5 Application Attacks
Module 2.5 Application Attacks




No comments:

Post a Comment