Examine threat vectors and data breaches
This module examines the types of threat vectors and their potential outcomes that organizations must deal with on a daily basis and how users can enable hackers to access targets by unwittingly executing malicious content.
Learning objectives
By the end of this module, you should be able to:
Describe techniques hackers use to compromise user accounts through email.
Describe techniques hackers use to gain control over resources.
Describe techniques hackers use to compromise data.
Mitigate an account breach.
Prevent an elevation of privilege attack.
Prevent data exfiltration, data deletion, and data spillage.
Prerequisites
None