Digital Learning

Introduction to Cybersecurity

2 Hours

After you complete this training, you should be able to:

  • Describe the current cybersecurity landscape
  • Identify cybersecurity threats
  • Evaluate different malware types and cyberattack techniques
  • Describe the relationship between vulnerabilities and exploits
  • Identify how spamming and phishing attacks are performed
  • Describe Wi-Fi vulnerabilities, attacks, and advanced persistent threats
  • Explain perimeter-based Zero Trust security models
  • Identify capabilities of the Palo Alto Networks prevention-first architecture

Target Audience

Customers, partners, employees, students, and/or anyone who has a desire to learn about cybersecurity


Cybersecurity Fundamentals

LinkedIn Image

Want updates and announcements?