Course Outline

Introduction

Threat Actors and Their Motivation

  • Cybercriminals
  • Script kiddies
  • State-sponsored hackers
  • Hacktivists
  • Insiders
  • Researchers / white hackers

Types of Cyber Attacks

  • Ransomware
  • DDOS
  • APT

Tactics and Techniques

  • Phishing, vishing, smishing
  • Malicious devices
  • Physical security
  • Brute force/password spray
  • APT attacks

Cyber Resilience Strategy

  • MITRE ATT&CK
  • Defense-in-depth
  • Security monitoring
  • Disaster recovery

Personal Security

  • Passwords security and multifactor authentication
  • Darknet monitoring
  • Secure Internet connection
  • Data encryption
  • Secure email
  • Mobile security

Summary and Next Steps

Requirements

Basics of computer use
Basics of internet and email use

 7 Hours

Testimonials (1)

Related Courses

CRISC - Certified in Risk and Information Systems Control

21 Hours

CRISC - Certified in Risk and Information Systems Control - 4 Days

28 Hours

IBM Qradar SIEM: Beginner to Advanced

14 Hours

OSINT Practitioner Course (Advanced OSINT)

14 Hours

Open Source Cyber Intelligence - Introduction

7 Hours

Fundamentals of Corporate Cyber Warfare

14 Hours

Cloud Computing Security Knowledge (CCSK) Preparation Course

21 Hours

Certificate of Cloud Security Knowledge (CCSK) Foundation (CSA authorized)

14 Hours

Certificate of Cloud Security Knowledge (CCSK) Plus (CSA authorized)

21 Hours

Application Security for Developers

21 Hours

Android Security

14 Hours

Comprehensive C# and .NET Application Security

21 Hours

Network Security and Secure Communication

21 Hours

Combined C/C++, JAVA and Web Application Security

28 Hours

Application Security in the Cloud

21 Hours

Related Categories