Course Outline

Introduction

Threat Actors and Their Motivation

  • Cybercriminals
  • Script kiddies
  • State-sponsored hackers
  • Hacktivists
  • Insiders
  • Researchers / white hackers

Types of Cyber Attacks

  • Ransomware
  • DDOS
  • APT

Tactics and Techniques

  • Phishing, vishing, smishing
  • Malicious devices
  • Physical security
  • Brute force/password spray
  • APT attacks

Cyber Resilience Strategy

  • MITRE ATT&CK
  • Defense-in-depth
  • Security monitoring
  • Disaster recovery

Personal Security

  • Passwords security and multifactor authentication
  • Darknet monitoring
  • Secure Internet connection
  • Data encryption
  • Secure email
  • Mobile security

Summary and Next Steps

Requirements

Basics of computer use
Basics of internet and email use

  7 Hours
 

Number of participants


Starts

Ends


Dates are subject to availability and take place between 09:30 and 16:30.
Open Training Courses require 5+ participants.

Testimonials (1)

Related Courses

CRISC - Certified in Risk and Information Systems Control

  21 Hours

Standard Java Security

  14 Hours

Java and Web Application Security

  21 Hours

Advanced Java Security

  21 Hours

Advanced Java, JEE and Web Application Security

  28 Hours

.NET, C# and ASP.NET Security Development

  14 Hours

Comprehensive C# and .NET Application Security

  21 Hours

Advanced C#, ASP.NET and Web Application Security

  21 Hours

Related Categories