XBUS-601 Threats, Vulnerabilities and Social Engineering in Cybersecurity

School of Continuing Studies

How long?

  • online

What are the topics?

School of Continuing Studies

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

About the course

To be successful, cybersecurity practitioners require an understanding of many technology disciplines. The first part of the course will cover vulnerabilities and weaknesses of software and hardware environments that must be secured. The second part of the course will focus on the frequently overlooked and often weakest element of securing data and systems: the human element. A vast majority of successful hackers use social engineering rather than technical attacks. Common social engineering tactics, including pretexting, phishing, baiting, hackers, rogue employees, industrial and spies will be discussed. The course will also include a variety of case studies of successful social engineering.

Note: This class will follow the pattern of SCAN/FOCUS/ACT. That is, we will start by scanning a particular topic (e.g., cyber risk) at a high level and then focus on specific aspects of risk to study in more detail. After gaining a comprehensive understanding of the risk, we will develop an action plan that combines both risks and vulnerabilities components. The Group activities defined below apply to the entire class as a single group. Some activities will be performed by Teams, which will be subsets of the Group. Attendees will participate in several different Teams throughout the course. Teams are not static.

Course Objectives

Upon completion of this course, students will be able to:

  • Understand the major types of threats and vulnerabilities in current systems (Scan)
  • Explain the methods of risk assessment (Scan)
  • Describe the major threat actors (e.g., hacktivists, nation-states, insiders) and their motivations to attack (Focus)
  • Define the major vulnerabilities exploited by the threat actors (Scan)
  • Develop a high level plan to train users to minimize a specific risk or vulnerability (Act)

Experts

John Harmon

John Harmon is a Regional Sales Manager at Endgame where he leads sales and capture for the US Intelligence Community, DOD, and Federal Law Enforcement. He has spent the past 15 years in the US Intelligence Community as an SIGINT analyst, cyber capabilities developer, technical team lead in cyber...

XBUS-601 Threats, Vulnerabilities and Social Engineering in Cybersecurity at School of Continuing Studies

From  $1,055

Something went wrong. We're trying to fix this error.

Thank you for your application

We will contact the provider to ensure that seats are available and, if there is an admissions process, that you satisfy any requirements or prerequisites.

We may ask you for additional information.

To finalize your enrollment we will be in touch shortly.

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.

We are happy to help you find a suitable online alternative.