Common types of attack /

Saved in:
Bibliographic Details
Edition:[First edition].
Imprint:[Place of publication not identified] : Assemble You, 2022.
Description:1 online resource (1 sound file (12 min.))
Language:English
Subject:
Format: E-Resource Spoken word recording Audio Streaming Audio
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/13701447
Hidden Bibliographic Details
Other authors / contributors:Assemble You, publisher.
Sound characteristics:digital
Digital file characteristics:audio file
Notes:Online resource; title from title details screen (O'Reilly, viewed July 26, 2022).
Summary:Welcome to Audio Learning from Assemble You. Hackers conduct cyber attacks to steal information, sabotage one or more systems, or bring down a working network. They can also attack several systems at once, gain control, and use these systems to initiate another attack on a different network altogether. In this track, we'll learn about social engineering, malware, ransomware, distributed denial of service, Man-in-the-middle (MITM) attacks, insider threats, credential reuse, and mobile attacks. Learning Objectives Learn about the most common threats to cyber security Learn the techniques to protect yourself against common attacks.
Standard no.:125053AYPOD

System Under Maintenance

Our Library Management System is currently under maintenance.

Holdings and item availability information is currently unavailable. Please accept our apologies for any inconvenience this may cause and contact us for further assistance:

catalog@lib.uchicago.edu