Understanding Cyberattacks and How to Counter Them
Difficulty: Beginner
Duration: 5 minutes and 5 seconds
Students: 2,034
Rating: 4.4/5
In this brief Lesson we will look at how cyberattacks are carried out. We will also consider the various groups of people who have an interest in carrying out such attacks, otherwise known as threat actors. We will then look at ways of counteracting attacks through the use of ethical testing, as well as how to cope with an attack by implementing an incident response strategy.
Learning Objectives
- Learn how an external attack is carried out and by which threat actors
- Understand how ethical testing is used to evaluate IT security
- Learn about security incident response
Intended Audience
This Lesson is intended for anyone who has limited knowledge of IT security and wants to learn more about the topic.
Prerequisites
We recommend taking this Lesson as part of the IT Security Fundamentals course.
Covered Topics
This content is developed in partnership with QA
Learn more