Skip To Content
Cyber Threats and Vulnerabilities is a Course

Cyber Threats and Vulnerabilities

Time limit: 90 days

$300 Enroll

Full course description

Course Title

Cyber Threats and Vulnerabilities

Course Description

This course provides an overview of cyberspace and the ever changing threat landscape. It provides an understanding of the evolving threats from bad actors, including phishing, ransomware, cryptojacking and use of social engineering tactics. The course briefly sets the history of cyber crime and recent major breaches and addresses key changes and trends in the space today. The course covers corporate, government and consumers responses to growing challenges.

Learning Objectives

  • You will understand the application of cybersecurity in a corporate (and government) culture and the varying risks in the cyber ecosystem.

  • You will understand cloud computing, mobility, and the Internet of Things (IOT), and the security implications and challenges involved with these important trends.

  • You will understand effective technologies and responses necessary to secure data and connected devices.


Course Contributors 

William G. Oates

Instructor

William G. Oates

Principal, TCM Global Services
Adjunct Faculty Boston College

Read instructor bio

John Merto

Subject Expert

John Merto

Chief Information Security Officer
Commonwealth of Massachusetts

Read instructor bio

Etay Maor

Subject Expert

Etay Maor

Executive Security Advisor
IBM Security

Read instructor bio

TJ Costello

Subject Expert

TJ Costello

Director, Smart Cities and Transportation
Cisco Systems

Read instructor bio