Plan Szkolenia

Introduction

Threat Actors and Their Motivation

  • Cybercriminals
  • Script kiddies
  • State-sponsored hackers
  • Hacktivists
  • Insiders
  • Researchers / white hackers

Types of Cyber Attacks

  • Ransomware
  • DDOS
  • APT

Tactics and Techniques

  • Phishing, vishing, smishing
  • Malicious devices
  • Physical security
  • Brute force/password spray
  • APT attacks

Cyber Resilience Strategy

  • MITRE ATT&CK
  • Defense-in-depth
  • Security monitoring
  • Disaster recovery

Personal Security

  • Passwords security and multifactor authentication
  • Darknet monitoring
  • Secure Internet connection
  • Data encryption
  • Secure email
  • Mobile security

Summary and Next Steps

Wymagania

Basics of computer use
Basics of internet and email use

  7 godzin

Liczba uczestników



Cena za uczestnika

Opinie uczestników (1)

Szkolenia Powiązane

CRISC - Certified in Risk and Information Systems Control

  21 godzin

Standard Java Security

  14 godzin

Java and Web Application Security

  21 godzin

Advanced Java Security

  21 godzin

Advanced Java, JEE and Web Application Security

  28 godzin

.NET, C# and ASP.NET Security Development

  14 godzin

Powiązane Kategorie