Skip main navigation

Hurry, only 1 day left to get one year of Unlimited learning for £249.99 £174.99. New subscribers only. T&Cs apply

Find out more

Typical Attacks Against a Network Continued

In this video, you will continue to learn about the typical strategies used by hackers to breach a network.

In this video, you will continue to learn about the typical strategies used by hackers to breach a network, with a focus on insider threat as the most dangerous threat to a network.

Insider threats refer to attacks that come from a person within your organization. This video will explain why a person would intentionally attack an organization they are a part of and how a person can be targeted and used to enact an insider attack without their awareness.

Reflect and share: Which of the types of attacks reviewed in this video and the previous video do you think you are most vulnerable to and why? Share your comments in the section below.

This article is from the free online

Advanced Cyber Security Training: Network Security

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now