Uptime logo
Uptime logo
CreatorsSign in

Get in touch

Contact usFAQ
InstagramFacebookTwitterLinkedIn
CreatorsSign in
en

Course Hack
Common Malware Attacks and Defense StrategiesBy EC-Council, Lisa Gilbert, Skylar Simmons

In a Nutshell

In this online course from EC-Council, learn about different cybersecurity threats and how to counter them.

Favorite Quote

Constantly, every second of the day, all over the world … different bad guys are attacking.

Skylar Simmons

Introduction

A serious cybersecurity breach can devastate a company or an individual.

The most serious cyber attacks of recent years have stolen millions from companies and even damaged nuclear centrifuges.

What methods do attackers use, and how can we protect ourselves against them?

Lisa Gilbert is a Cybersecurity Compliance Engineer with Motorola Solutions, and Skylar Simmons is a Penetration Testing and Red Team Supervisor, and U.S. Army veteran.

In this FutureLearn course from the cybersecurity certification body EC-Council, Gilbert and Simmons outline the various malware and cyber threats and teach students how to protect themselves and their organizations.

The course covers topics including phishing attacks, malware attacks, and social engineering.

Here are the 3 key insights from this Hack

  1. 1.
    Phishing is one of the most common cyber attacks
  2. 2.
    Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc volutpat, leo ut.
  3. 3.
    Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc volutpat, leo ut.
To see the rest,Download the app

Thousands more Hacks on Uptime

Stand out from the crowd

Uptime helps you save time, reach your goals, and feel more confident across any area of your life.