We can improve your training in less than 5 minutes. TAKE OUR QUIZ
Course
This course will address emerging cybersecurity threats. It provides an overview of each threat, provides examples of attacks that have occurred, and suggests defensive strategies.
Download a SCORM file, ready to upload to your LMS, or the editable Articulate Storyline file, allowing you to modify the course.
To view this course and other courses in our catalog, sign up for our free trial.
✓  Overview of emerging threats
✓  Recent examples and attacks
✓  Threat actors
✓  Vulnerabilities
✓  Defence Strategies
IT security professionals and others interested in information security.
45 minutes
Self-paced e-Learning
Technology
Section 508
Data Protection
Cyber Security
Information Security
Get instant access to your files.
Courses are free for existing Knowledge Anywhere customers-contact us.*
SCORM
Download a SCORM file, ready for upload to your LMS.
Articulate Storyline
Download an editable Articulate Storyline file, allowing you to modify the course.
*Restriction may apply.
We use cookies to improve your experience on our site. By using our site, you consent to cookies.
Manage your cookie preferences below:
Essential cookies enable basic functions and are necessary for the proper function of the website.
Stripe is a payment processing platform that enables businesses to accept online payments securely and efficiently.
Service URL: stripe.com
Statistics cookies collect information anonymously. This information helps us understand how visitors use our website.
Google Analytics is a powerful tool that tracks and analyzes website traffic for informed marketing decisions.
Service URL: policies.google.com
Clarity is a web analytics service that tracks and reports website traffic.
Service URL: clarity.microsoft.com
SourceBuster is used by WooCommerce for order attribution based on user source.
You can find more information in our PRIVACY POLICY and PRIVACY POLICY.