Understanding Cyberattacks and How to Counter Them

Difficulty: Beginner
Duration: 5 minutes and 5 seconds
Students: 2,033
Rating: 4.4/5

In this brief Lesson we will look at how cyberattacks are carried out. We will also consider the various groups of people who have an interest in carrying out such attacks, otherwise known as threat actors. We will then look at ways of counteracting attacks through the use of ethical testing, as well as how to cope with an attack by implementing an incident response strategy.

Learning Objectives

  • Learn how an external attack is carried out and by which threat actors
  • Understand how ethical testing is used to evaluate IT security
  • Learn about security incident response

Intended Audience

This Lesson is intended for anyone who has limited knowledge of IT security and wants to learn more about the topic.

Prerequisites

We recommend taking this Lesson as part of the IT Security Fundamentals course.

QA
This content is developed in partnership with QA
Learn more