Welcome to week 4; threats and social engeneering Here we are! The final section of the course.  What are amazing job you've done so far! Putting in the time,  dedication, and hard work to get to  this point is definitely something to celebrate. But we're not through yet. As we near the end of this course,  now's the time to focus and finish strong. Let's turn our attention to threats.  We've already explored assets,  vulnerabilities, and the controls used to protect both. A common theme between those two topics has  been the wide range of assets  and vulnerabilities out there. The world of threats is no different.  If you recall, threats are any circumstance  or event that can negatively impact assets. In this part of the course,  you're going to expand your security mindset by getting  a high-level view of  the most dangerous threats facing organizations today.  First, we're going to begin by  exploring social engineering tactics,  psychological tricks that attackers use to  gain unauthorized access to assets.  Next, we'll explore a common type of threat that's been  around since the start of personal computers, malware. We're going to spend some time  investigating the major types of malware.  After that, we'll turn  our attention to web-based exploits. Most organizations these days operate in a digital space,  and many of them are new to it. In this section of the course,  you're going to learn about some of  the most common threats that organizations face online.  Finally, after exploring  common threats that organizations deal with,  we're going to wrap up by exploring the threat modeling process.  Understanding threats is essential for  a security analyst, and there's a lot to cover. So, let's get started!