Technological advances change how we live, work, and relate to one another. Remote presence and the interconnectivity of people, devices, and organizations open a whole new playing field of vulnerabilities and access points that cybercriminals can exploit. While the pace of technology innovation is increasing, cyberattacks are becoming more destructive globally. Security incidents continue to rise and will continue to be a top-of-mind item for businesses, governments, and industry regulators. Cybersecurity is not just an IT responsibility. To effectively prevent attacks and build robust defenses, everyone within an organization needs to stay aware of emerging threats, technologies, and practices. This course is designed to help both individuals and organizations adopt a security-centric mindset and habits that safeguard data and networks from potential cyberattacks and theft.
The enclosed case study, “Change Healthcare Cyberattack”, demonstrated how vulnerabilities in cybersecurity practices led to a significant breach. Real-world examples are incorporated throughout courses to enhance understanding. The course also includes checklists that guide you through the recovery process after losing personal information and help businesses to make smart, sound decision of responding to a data breach, as well as cybersecurity tips for small businesses that protect the business, customers, and data from growing threats.
Course Publication Date:
December 03, 2025
This course is available with
NO ADDITIONAL FEE if you have an active
self study membership or
all access membership or can be purchased for
$80.00!
| Author: | Delta CPE |
| Course No: | TECH-CYBERSEC-4955 |
| Recommended CPE: | 8.00 |
| Delivery Method: | QAS Self Study |
| Level of Knowledge: | Basic |
| Prerequisites: | None |
| Advanced Preparation: | None |
| Recommended Field of Study: | Information Technology
|
|
|
|
Learning Objectives
- Recognize threats driven by emerging technologies.
- Identify factors contributing to the rise of cybercrime.
- Recognize the key components of the MITRE ATT&CK framework.
- Identify common types of cyber threat actors.
- Recognize phishing attempts and ways to avoid them.
- Identify ransomware protection and response strategies.
- Recognize the target of digital skimming and protection measures.
- Identify DDoS attack methods and mitigation techniques.
- Recognize the key federal laws that govern data privacy and security.
- Identify the NIST Cybersecurity Framework core functions.
- Recognize the key aspects of ISO 27001 and PCI DSS.
- Recognize the benefit of the CIS controls.