2.6 Module 2 Recap
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:01
at the end of model to let's do a short recap at what you have learned,
00:06
units.
00:07
So ah, we're
00:10
we have been talking about Who are the people you are defending against?
00:16
Um, what are the threats?
00:19
What do they want
00:21
and how are they going to attack you? You're in points
00:26
classified by 10 points. So we talked about
00:30
all the classes off hackers of cyber criminals.
00:35
Uh, you learn that in most of the cases they just want money or some kind of monetary gain. It doesn't have to be your money exactly. But it will damage your financially anyway.
00:48
And that in very rare cases there, looking physically to damage you
00:53
in terms off, making your company non functional for a period of time or your website wherever they want to do
01:02
and is the ways of attacking they can attack you through mala where they can attack you from through. Ah, all sorts of females. Melber websites. They can just get your credential by using social engineering or look over your shoulder when you're in public space.
01:22
So basically there are many, many ways
01:25
in which they can get the information they need to successfully break through your defenses and you have to have all of that in might,
01:34
And this concludes the model, too.
Up Next
Instructed By
Similar Content