Lesson 2: Identifying Common Cyber Threats

Objective: Learn to identify common cyber threats and the tactics used by attackers.

Key Topics:

  • Phishing: What it is, how to spot it, and how to avoid it.
  • Spear-phishing: Targeted attacks and their warning signs.
  • Social Engineering: Techniques attackers use to manipulate individuals.
  • Malware: Types (viruses, ransomware, spyware) and how they infect devices.
  • Insider Threats: How to recognize potential risks from within the company.
  • Unsecure: The Risks of Unsecured Networks and Devices
  • Case Study: How a Ransomware Attack Crippled a Business

Activity:

  • Case study: How a ransomware attack crippled a business.