Understanding Cyberattacks and How to Counter Them

5m 5s

In this brief Lesson we will look at how cyberattacks are carried out. We will also consider the various groups of people who have an interest in carrying out such attacks, otherwise known as threat actors. We will then look at ways of counteracting attacks through the use of ethical testing, as well as how to cope with an attack by implementing an incident response strategy.

Learning Objectives

  • Learn how an external attack is carried out and by which threat actors
  • Understand how ethical testing is used to evaluate IT security
  • Learn about security incident response

Intended Audience

This Lesson is intended for anyone who has limited knowledge of IT security and wants to learn more about the topic.


We recommend taking this Lesson as part of the IT Security Fundamentals course.

About the Author
King Samuel, opens in a new tab
Cyber Security Trainer
Learning paths

Originating from a systems administration/network architecture career, a solid part of his career building networks for educational institutes. With security being a mainstay his implementation he grew a strong passion for everything cyber orientated especially social engineering. The educational experience led to him mentoring young women in IT, helping them to begin a cyber career. He is a recipient of the Cisco global cyber security scholarship. A CCNA Cyber Ops holder and elected for the CCNP Cyber Ops program.

Covered Topics