Examine threat vectors and data breaches

Examine threat vectors and data breaches

This module examines the types of threat vectors and their potential outcomes that organizations must deal with on a daily basis and how users can enable hackers to access targets by unwittingly executing malicious content.

Administrator
Solution Architect
Technology Manager
Microsoft 365
Office 365

Module Objectives

By the end of this module, you should be able to:

  • Describe techniques hackers use to compromise user accounts through email
  • Describe techniques hackers use to gain control over resources
  • Describe techniques hackers use to compromise data
  • Mitigate an account breach
  • Prevent an elevation of privilege attack
  • Prevent data exfiltration, data deletion, and data spillage

Prerequisites

None