Course Outline

Introduction

Different Aspects of Enterprise Security

Companies Are More Vulnerable to Cyber Warfare than Governments

  • Corporate espionage (industrial espionage)
  • Corporate sabotage (industrial sabotage)
  • Extortion

Beyond Traditional Enterprise Security

  • Non-standard approaches to breaching your systems
  • Compromising your company...without breaching your systems
  • Artificial Intelligence (AI) in the age of corporate cyber warfare

How AI Will Be Used to Launch the Next Cyber Attack on Your Company

  • Beyond database injection
  • Fooling a company's computers and employees
  • The offensive mindset vs detection mindset

Attack Patterns

  • Systems and tools for launching cyber attacks

Beyond Dumb Bots. Intelligent Bots.

  • Humans or robots?
  • Designing intelligence

Building Comprehensive AI Response Systems

The Future of Corporation Cyber Security in a World of AI, Big Data, and Cyber Warfare

Summary and Next Steps

Requirements

  • Knowledge or interest in cyber security

Audience

  • Cyber security specialists
  • System administrators
  • Cyber security managers
  • Cyber security auditors
  • CIOs
  14 Hours
 

Testimonials

Related Courses

Advanced PHP and Secure Coding Course

  35 hours

BeyondCorp: Implementing Zero Trust Security

  14 hours

Cyber Crisis & Communications Planning

  7 hours

Ethical Hacker

  35 hours

Understanding Modern Information Communication Technology

  7 hours

Automotive Cyber Security Fundamentals

  21 hours

Business Continuity Practitioner

  14 hours

CAS for Administrators

  7 hours

Certified Ethical Hacker

  35 hours

IoT Security Architecture

  14 hours

NetNORAD

  7 hours

Network Security Administrator

  35 hours

Web Security with the OWASP Testing Framework

  28 hours

Shadowsocks: Set Up a Proxy Server

  7 hours