TrueschoTruescho
All Courses
Cybersecurity: What to Do When You Are a Victim
Coursera
Course
Unknown

Cybersecurity: What to Do When You Are a Victim

Kennesaw State University

Understand the technical infrastructure and actions to take if affected by a cybersecurity attack, privacy breach, or identity theft.

Unknown5 weeksEnglish

About this Course

Cybersecurity is essential for everyone who uses information or communications technologies. Whether it is a computer, tablet, or smartphone, if it is connected to a network, learn about the technical infrastructure that connects it to the Internet. The objectives of this course are: List the resources available to a victim of a Cybersecurity attack, Describe the steps to take if you think you’ve been hacked, and Describe the steps to take if you think you’re the victim of a privacy attack or identity theft

What You'll Learn

  • Identify resources available for cybersecurity attack victims
  • Describe steps to take if a breach is suspected
  • Implement privacy and identity protection measures

Prerequisites

  • Suitable for all users of computers and internet technologies

Instructors

H

Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

Professor of Information Security

M

Michael Whitman, Ph.D., CISM, CISSP

Professor of Information Security

Topics

Security
Information Technology
Business Essentials
Business
Security Awareness
Cybersecurity
Threat Detection
Computer Security Incident Management
Network Security
Cyber Attacks

Course Info

PlatformCoursera
LevelUnknown
PacingUnknown
PriceFree

Skills

الأمن
تكنولوجيا المعلومات
أساسيات الأعمال
الأعمال
التوعية الأمنية
الأمن السيبراني
كشف التهديدات
إدارة حوادث أمن الحاسب
Network Security
Cyber Attacks

Start Learning Now