Examine threat vectors and data breaches
This module examines the types of threat vectors and their potential outcomes that organizations must deal with on a daily basis and how users can enable hackers to access targets by unwittingly executing malicious content.
                                Administrator
                            
                            
                                Solution Architect
                            
                            
                                Technology Manager
                            
                            
                                Microsoft 365
                            
                            
                                Office 365
                            
                    Module Objectives
By the end of this module, you should be able to:
- Describe techniques hackers use to compromise user accounts through email
- Describe techniques hackers use to gain control over resources
- Describe techniques hackers use to compromise data
- Mitigate an account breach
- Prevent an elevation of privilege attack
- Prevent data exfiltration, data deletion, and data spillage
Units
Prerequisites
None
