In this article, you will learn about how attackers use psychology to bypass technical security measures. Note: Attempting to phish the credentials of someone without their express consent is illegal. The information…
It seems like nothing else could go wrong with this computer. If this was a game of malware bingo, you would be one step away from winning the jackpot. For fun, you…
The rootkit allowed someone access to this computer. What did they do with that access? You realize that the rootkit was used to deny the user access to files on their system…
While the presence of spyware makes it obvious something nefarious was installed on the computer, was anything else installed? Ugh, of course. After more digging, you find a Trojan Horse. Wow, is…
ChatGPT has landed and it has sent large shockwaves through many industries. One particular industry where it’s gaining popularity is corporate Learning & Development (L&D). But how effective is it as a professional…
Abstract: Collecting and analyzing stakeholder feedback plays a vital role in cross-functional team building as it enables a comprehensive understanding of the needs, expectations, and perspectives of individuals impacted by or involved…
It’s your first day on the job at Cybercademy — a new cybersecurity organization that helps companies improve their security practices. Your Task Identify various types of malware on an infected device…
Cyber Threats and the Threat Landscape The threat landscape is ever-evolving and ever-expanding. The constant conflict between attackers and defenders pushes attackers to develop new attacks and defenders to develop new ways…
In this article, you’ll learn about some standards, regulations, and frameworks that govern and support cybersecurity. Cybersecurity is serious business; the potential consequences for a security breach can be dire, particularly if…
Cybersecurity was invented as soon as the first group of people attempted to defend from digital attacks. We’ll walk through a brief history of cybersecurity through the 60’s, 70’s, all the way…
John P. Kotter’s article, “Leading Change: Why Transformation Efforts Fail,” published in the Harvard Business Review in 1995, discusses the challenges that organizations face when attempting to transform themselves. Kotter, a Harvard…
Introduction:In his 1995 Harvard Business Review article, “Leading Change: Why Transformation Efforts Fail,” John Kotter addresses the difficulties and challenges that organizations face when attempting to implement change. He argues that successful…
The article by Karl E. Weick and Robert E. Quinn, entitled “Organizational Change and Development,” provides an in-depth review of the existing research and theories on organizational change and development. The authors…
In 1947, Kurt Lewin published an article in Human Relations titled “Frontiers in Group Dynamics: Concept, Method, and Reality in Social Science; Social Equilibria and Social Change.” This seminal paper is considered…
“Built to Last: Successful Habits of Visionary Companies” is a book written by James C. Collins and Jerry I. Porras and was published in 1994 by HarperCollins Publishers. The book is a…
Competing by Design: The Power of Organizational Architecture is a book written by David A. Nadler, Michael L. Tushman, and Mark B. Nadler in 1997. The authors argue that the success of…
In this article, you’ll explore the evolution of hacking and cybersecurity. When ENIAC, the first modern computer, was brought online in 1945, cybersecurity wasn’t a word you could find in the dictionary. The only way…
Goffee and Jones’ book, “The Character of a Corporation: How Your Company’s Culture Can Make or Break Your Business,” examines the crucial role of corporate culture in the success or failure of…
In the upcoming section of this course, we will discuss what cryptography is and how it is used for security. This is a good opportunity to also introduce the concepts of authentication,…
Tushman and O’Reilly (1996) discuss the concept of ambidextrous organizations, which are able to effectively manage both evolutionary and revolutionary change. They argue that in order to succeed in today’s dynamic business…