Introduction

Completed

In our modern world, people and organizations rely on connected devices to meet their most vital day-to-day needs. Devices access and store important business and personal data, while continuously collecting information about us. As a result, cybercriminals target devices to gain unauthorized access and control of valuable data, creating havoc to users and organizations. In this module, you'll learn how to guard against device-based cyberattacks to protect data and mitigate the impact for people and organizations.

By the end of this module, you'll be able to:

  • Describe what your device knows about you.
  • Describe how devices become cybersecurity threats.
  • Describe how to mitigate against device-related threats.