Examine threat vectors and data breaches

Intermediate
Administrator
Solution Architect
Technology Manager
Microsoft 365
Office 365

This module examines the types of threat vectors and their potential outcomes that organizations must deal with on a daily basis and how users can enable hackers to access targets by unwittingly executing malicious content.

Learning objectives

By the end of this module, you should be able to:

  • Describe techniques hackers use to compromise user accounts through email.

  • Describe techniques hackers use to gain control over resources.

  • Describe techniques hackers use to compromise data.

  • Mitigate an account breach.

  • Prevent an elevation of privilege attack.

  • Prevent data exfiltration, data deletion, and data spillage.

Prerequisites

None