Course Outline
Introduction
Different Aspects of Enterprise Security
Companies Are More Vulnerable to Cyber Warfare than Governments
- Corporate espionage (industrial espionage)
- Corporate sabotage (industrial sabotage)
- Extortion
Beyond Traditional Enterprise Security
- Non-standard approaches to breaching your systems
- Compromising your company...without breaching your systems
- Artificial Intelligence (AI) in the age of corporate cyber warfare
How AI Will Be Used to Launch the Next Cyber Attack on Your Company
- Beyond database injection
- Fooling a company's computers and employees
- The offensive mindset vs detection mindset
Attack Patterns
- Systems and tools for launching cyber attacks
Beyond Dumb Bots. Intelligent Bots.
- Humans or robots?
- Designing intelligence
Building Comprehensive AI Response Systems
The Future of Corporation Cyber Security in a World of AI, Big Data, and Cyber Warfare
Summary and Next Steps
Requirements
- Knowledge or interest in cyber security
Audience
- Cyber security specialists
- System administrators
- Cyber security managers
- Cyber security auditors
- CIOs
Testimonials (3)
A variety of thematic areas, as well as a display of curiosities, equipment and drawing attention to seemingly less important elements.
Kamil - Komenda Główna Straży Granicznej
Course - Bezpieczeństwo IT - wprowadzenie
Machine Translated
Hazem has a very recent experience passing the exam and knows the gotchas and the way how ISC structures their questions.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Certified Information System Security Professional (CISSP) CBK Review
The way to receive the information from the trainer