Unit 1 Learning Objectives
UNIT 1: Introduction to Security
- Topic 1.1: Understanding Social Engineering
- 1.1.A: Identify common indicators of social engineering tactics.
- 1.1.B: Explain how social engineering tactics influence victims to perform a desired action.
- 1.1.C: Describe possible impacts for victims of social engineering attacks.
- Topic 1.2: Suspicious Wi-Fi Login
- 1.2.A: Identify common signs of a password attack.
- 1.2.B: Explain how adversaries take advantage of weak authentication.
- 1.2.C: Explain how to make authentication stronger.
- Topic 1.3: The Dangers of Public Wi-Fi
- 1.3.A: Identify the type of adversary conducting a cyberattack.
- 1.3.B: Identify types of wireless cyberattacks.
- 1.3.C: Explain how individuals can protect themselves from some cyberattacks.
- Topic 1.4: AI-Based Cybersecurity Attacks
- 1.4.A: Explain how adversaries use AI-powered tools to augment cyberattacks.
- 1.4.B: Explain how to protect against some AI-augmented cyberattacks.
- Topic 1.5: Leveraging AI in Cyber Defense
- 1.5.A: Explain how cyber defenders can leverage AI-powered tools to protect networks, applications, and data.
- 1.5.B: Explain how AI-powered tools are enabling faster and more accurate threat detection and response.