1 00:00:01,160 --> 00:00:03,450 The learning objectives for this section 2 00:00:03,500 --> 00:00:05,520 is to understand the current threat 3 00:00:05,590 --> 00:00:07,000 and vulnerability landscape. 4 00:00:07,320 --> 00:00:09,629 This means you’ll understand the weaknesses 5 00:00:09,630 --> 00:00:13,050 in systems, and processors, and actions. 6 00:00:13,370 --> 00:00:16,140 You will understand the threats and adversaries 7 00:00:16,270 --> 00:00:17,590 that you personally, 8 00:00:17,940 --> 00:00:18,940 and others, 9 00:00:19,050 --> 00:00:20,480 face on the internet, 10 00:00:20,750 --> 00:00:24,659 from hackers, to encryption regulation, from exploit kits, 11 00:00:24,660 --> 00:00:27,520 to pups and browser hijacking. 12 00:00:27,920 --> 00:00:30,580 These make up the threat landscape. 13 00:00:30,960 --> 00:00:34,480 The selection of appropriate security controls 14 00:00:34,790 --> 00:00:36,710 is based on risk 15 00:00:37,270 --> 00:00:40,220 in consideration of the threat landscape 16 00:00:40,570 --> 00:00:42,670 which we will go through now.