Module 2

Module 2

Best practices for detecting, assessing, reporting, and addressing
information security threats
Awareness of common information security terms
Attacks and Anatomy of Cyber Attacks;
Indicators of Cybersecurity Threats and Mitigations
Identifying, Responding to and Reporting Cyber Attacks

Lesson Content

Tags:
Share Article:

kdetraining

KDE Academy is a registered 501C3 non-profit organization. Training Teams. Securing Systems. Strengthening Trust.

Subscribe

* indicates required

Intuit Mailchimp

Copyright 2025 KDE Academy. All Rights Reserved.

Subscribe to get free checklist

    Name
    Reserve Your Free Session Today