We may earn an affiliate commission when you visit our partners.
Course image
Marcus O'Donnell, Siobhan Lenihan, Wendy Palmer, Lei Pan, Chie Adachi-Robertson, Nicholas Patterson, Alisha Hummel, Vikrant Patel, Rolando Trujillo Rasua, Matthew Warren, and Georgie Lowe

Topics Covered

Read more

Topics Covered

  • The Panama Papers, a real cyber attack
  • Cyber threats and the methods that hackers use
  • Consequences of cyber attacks for small and medium enterprises
  • Tools and preventative strategies that you can put in place to protect your organisation

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

Save this course

Save Cyber Security for Small and Medium Enterprises: Identifying Threats and Preventing Attacks to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Cyber Security for Small and Medium Enterprises: Identifying Threats and Preventing Attacks. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Cyber Security for Small and Medium Enterprises: Identifying Threats and Preventing Attacks will develop knowledge and skills that may be useful to these careers:

Reading list

We haven't picked any books for this reading list yet.
For those interested in cloud security, this book provides a comprehensive overview of the challenges and best practices specific to cloud environments. It covers topics such as cloud architecture, data protection, and compliance.
Provides a comprehensive introduction to cyber security, covering a wide range of topics, including network security, ethical hacking, and incident response. It is suitable for both beginners and experienced professionals.
For readers interested in delving deeper into the analysis of malware, this book offers a comprehensive guide to the techniques and tools used by security professionals. It provides valuable insights into the behavior and detection of malicious software.
This framework developed by NIST provides a set of guidelines and best practices for managing and reducing cyber security risks. It is essential reading for anyone involved in cyber security policy and implementation.
This comprehensive guide provides a holistic overview of cyber security, covering both theoretical concepts and practical implementation strategies. It is an excellent resource for anyone seeking a foundational understanding of the field.
For those interested in exploring the practical aspects of cyber security, this book offers a hands-on approach. It guides readers through real-world scenarios and demonstrates how to use Python for various cyber security tasks.
This textbook offers a comprehensive treatment of cyber security principles and practices. It covers various aspects of cyber security, including risk management, incident response, and cloud security.
This textbook provides a rigorous and comprehensive treatment of cryptography and network security. It is an excellent resource for students and researchers interested in the mathematical foundations of cyber security.
For readers interested in a more theoretical approach, this book explores the mathematical foundations of cyber threats and countermeasures. It provides a rigorous treatment of cryptography and network security.
This textbook provides a comprehensive overview of the fundamental principles of information security. It valuable resource for students and professionals seeking a solid foundation in the field.
This book, written by a renowned hacker and security expert, explores the human element of cyber security. It provides insights into social engineering and deception techniques used by attackers and offers strategies for mitigating these threats.
Explores the psychology of social engineering attacks, which are often used to gain access to sensitive information or systems. It provides insights into how attackers manipulate human behavior and offers tips on how to protect against these attacks.
Provides a comprehensive overview of computer security, covering topics such as cryptography, access control, and intrusion detection. It classic textbook that is suitable for both undergraduate and graduate students.
Introduces the fundamentals of malware analysis, including topics such as static and dynamic analysis, and reverse engineering. It practical guide that is suitable for both beginners and experienced malware analysts.
Provides a comprehensive overview of cybersecurity and cyberwarfare, covering topics such as the history of cyberattacks, the motivations of attackers, and the methods used to defend against cyber threats. It is an excellent resource for anyone who wants to learn more about this important topic.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Cyber Security for Small and Medium Enterprises: Identifying Threats and Preventing Attacks.
Understanding Data in the Tourism Industry
Most relevant
Cyber Security Essentials: Your Role in Protecting the...
Most relevant
The Cyber Security Landscape
Most relevant
Introduction to Cyber Security
Most relevant
Information Security Awareness: An Introduction for UK...
Most relevant
Cyber Security Basics: A Hands-on Approach
Most relevant
Competitive Advantage: Using Information to Build...
Most relevant
Basics of Network Security
Most relevant
Check Point Jump Start: Quantum Management
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser