Cyber Immunity
3.7 (13 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
2,743 students enrolled

Cyber Immunity

How to transit from Cyber Security to Cyber Immunity? What does it mean to protect before any historical information?
New
3.7 (13 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
2,743 students enrolled
Created by Jouni Ruotanen
Last updated 4/2020
English
English
Current price: $25.99 Original price: $39.99 Discount: 35% off
12 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 1 hour on-demand video
  • 1 downloadable resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Differences between Cyber security and Cyber immunity
  • What kind of cyber threats currently exist
  • What it takes from organization to prepare better IT security
  • How to response IT security threats
  • How machine learning can be used to enhance immunity
Requirements
  • Basic knowledge about IT security
  • Interest to take organization's IT security next level
Description

Currently organizations face a problem in evolving new Cyber Security threats which can relate to trust, ransomware, insiders, AI attacks and Bring Your Own Device issues. This course will introduce a new solution to build up Cyber Immunity, not only tackle known issues.


It can cause a huge issue in an organization which is under attack. Legacy solutions may recognize the issue, but not solve it proactively. Cyber Immunity means a system which can recognize the threat and also respond immediately or at least alert security officer.


These system are build up with Artificial Intelligence (AI), or more likely with Machine Learning (ML). The important part is not to build totally new system, but also rely on existing security measures together.


Recently most common issues in cyber security are related to Advanced Persistent Threat (ATP) and Zero-day exploits. ATP refers to cyber-espionage and cyber-sabotage. There can be commercial groups doing them, but because most likely there will be spying or destroying as a target several governments have ordered them. Zero-day exploits are difficult to manage since developer may have left backdoor in purpose to offer later patch fixes or have a workaround until issues are solve. This needs Cyber Immunity, systems that can know what's correct, normal usage and not cause a threat to organizations.


Furthermore, IoT and cloud infrastructures need better cyber security, transition to Cyber Immunity. We have three kinds of threats that need to be prevented. Attacks by cyber criminals, typically related to blackmailing or stealing data among others. Attacks by hacktivists like Anonymous group which have political agenda and can cause a lot of harm to governments or even enterprises. Attacks by commercial groups which are related to cyber-espionage and cyber-sabotage. All these crimes should cost more to execute than the harm which they will cause to organization.


Start your next generation IT security era by learning in this course what Cyber Immunity means and what kind of threats it can offer solution. Let's start the journey!

Who this course is for:
  • IT security officers
  • IT managers
  • Cyber security professionals
Course content
Expand all 24 lectures 01:00:30
+ Introduction
4 lectures 10:30

Shortly what this course contains

Preview 01:55

About course structure

Preview 00:51

What is Cyber immunity and what it can solve in cyber security

Introduction
03:44

Shortly about instructor

Preview 04:00
+ From Cyber Security to Cyber Immunity
6 lectures 22:51

What's the transition from cyber security to cyber immunity

Preview 01:12

What's the idea behind cyber immunity

Cyber Immunity: Background
05:22

How cyber immunity differs from legacy cyber security

Cyber Immunity: New way!
06:15

What are cyber immunity use cases

Cyber Immunity: Use cases
03:58

What kind of cyber threats needs to be protected

Cyber Immunity: Threats
02:33

What kind of challenges aim to cyber immunity can have

Cyber Immunity: Challenges
03:31
+ Cyber Immunity Examples
6 lectures 09:17

What kind of solutions and threats have been already done and protected

Preview 01:22

How Darktrace helped to protect power stations

British Cyber Defense Strategy
01:47

How Kaspersky's anti drone system works

Kaspersky’s Anti Drone System
01:36

How it was possible to use IoT device to penetrate Casino's network

Fish Tank (Casino)
01:46

How European bank was affected when it's processing capacity was used to bitcoin mining

European Bank and Bitcoin
01:26

How insider was used to place Raspberry Pi to data center

Raspberry Pi and Data Center
01:20
+ Cyber Immunity Solutions
6 lectures 10:44

What you will learn about cyber immunity solutions

Preview 00:58

What's the definition for cyber security and how it affects to cyber immunity

Cyber Security Definition
01:47

How you can put categories to cyber attacks

Cyber Attack Categories
02:19

What are the newest and more complicated cyber risks organizations face at the moment

Newest Risks
01:42

What is adaptive immune system and how it works in cyber immunity

Adaptive Immune System
01:30

What kind of issues cyber immunity systems may have

Cyber Immunity System Issues
02:28
+ Conclusion
2 lectures 07:08

What this course taught you

Conclusion
01:54

Learn more!

Bonus lecture
05:14