Welcome to Cyber Exploits: Understand the Threat. To ensure your experience is optimized, please use JAWS version 18 or higher.

Cyber  Exploits  Understand the Threat

Botnets, crypto-ransomware, RATs, cross-site scripting.


heard these terms on the news.

Do you know what they mean? These are just a few examples of sophisticated cyber attacks that proliferate our online existence every day.

Give this course a little bit of your time
and attention, and we promise—it’ll all
be easier to understand.

Not everyone needs to be a Cyber subject matter expert.

But it’s critical to
understand the risks that
are all around us, from:

  • computers
    & devices
  • cars
  • household

Get used
to it.

Cyber breaches are

Anyone who has:

  • an email address
  • a social media account or
  • a mobile device

has been spoofed,
hacked, and attacked
or they will be.

As fast as
technologies evolve,

adapt and expand.

They put citizens, businesses, financial institutions, online commerce providers, and even national security at risk.

And because attackers invent new tactics at breakneck speed, it’s critical that you stay educated and up-to-date on what’s out there and where you’re vulnerable. This course is designed to help you do just that.

Course Summary

Over the next thirty minutes or so, we’re going to look at some of the Broader Categories of Cyber Attacks.

Within each of these categories, you’ll learn specific terminology and real-world applications so you can recognize a threat when you see it.

As our daily activities depend
progressively more on
computerized technology, we are
increasingly vulnerable to
cyber attacks.

Let’s get started.

Modules & Objectives

Hover over any of the five modules to read their corresponding summary. The Knowledge Checks at the end of each section will give you a chance to review, reinforce, and see just what you’ve learned.

Module 1: Denial-of-Service (DoS)

A DoS attack floods a site with false activity, overloading it to the point that legitimate users can’t access it.

Module 2: Compromised Trusted Websites

Well-known, seemingly secure websites are still vulnerable to attacks – often more dangerous because they are so unexpected.

Module 3: Spyware

Spyware is malicious software secretly installed on your computer and used to collect your private information.

Module 4: Man-in-the-Middle Attacks

MITM attacks allow hackers to get between users and their internet services, gaining access to any information a victim views online.

Module 5: Ransomware

Ransomware uses malware to remotely block access to all of the files on a device or network until the victim pays a ransom.

Click the button to continue. It’s safewe promise.