Course Outline

Introduction

Threat Actors and Their Motivation

  • Cybercriminals
  • Script kiddies
  • State-sponsored hackers
  • Hacktivists
  • Insiders
  • Researchers / white hackers

Types of Cyber Attacks

  • Ransomware
  • DDOS
  • APT

Tactics and Techniques

  • Phishing, vishing, smishing
  • Malicious devices
  • Physical security
  • Brute force/password spray
  • APT attacks

Cyber Resilience Strategy

  • MITRE ATT&CK
  • Defense-in-depth
  • Security monitoring
  • Disaster recovery

Personal Security

  • Passwords security and multifactor authentication
  • Darknet monitoring
  • Secure Internet connection
  • Data encryption
  • Secure email
  • Mobile security

Summary and Next Steps

Requirements

Basics of computer use
Basics of internet and email use

  7 Hours
 

Testimonials

Related Courses

Certified Chief Information Security Officer (CCISO)

  35 hours

Certified Ethical Hacker

  35 hours

Standard Java Security

  14 hours

Java and Web Application Security

  21 hours

Advanced Java Security

  21 hours

Advanced Java, JEE and Web Application Security

  28 hours

C/C++ Secure Coding

  21 hours

Microsoft SDL Core

  14 hours

.NET, C# and ASP.NET Security Development

  14 hours

Certificate of Cloud Security Knowledge

  14 hours

Fundamentals of Corporate Cyber Warfare

  14 hours

Open Source Cyber Intelligence - Introduction

  7 hours

Open Source Intelligence (OSINT) Advanced

  21 hours