Skip main navigation

What Can We Learn from Malicious Hackers?

In this video, you will learn more about the importance of understanding a hacker’s methodology to develop methods to protect your network.

In this video, you will learn more about the importance of understanding a hacker’s methodology to develop methods to protect your network. We will again base this on the five phases of hacking.

You have already learned about what hackers do at each of the five steps and the associated risks to your network because of their activities. We are now going to link this knowledge to what you can do to protect your network.

Reflect and share: Which of these types of protection approaches have you already been using, and how have you implemented it? Share your comments in the section below.

This article is from the free online

Advanced Cyber Security Training: Network Security

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now