Course Outline

Introduction

Threat Actors and Their Motivation

  • Cybercriminals
  • Script kiddies
  • State-sponsored hackers
  • Hacktivists
  • Insiders
  • Researchers / white hackers

Types of Cyber Attacks

  • Ransomware
  • DDOS
  • APT

Tactics and Techniques

  • Phishing, vishing, smishing
  • Malicious devices
  • Physical security
  • Brute force/password spray
  • APT attacks

Cyber Resilience Strategy

  • MITRE ATT&CK
  • Defense-in-depth
  • Security monitoring
  • Disaster recovery

Personal Security

  • Passwords security and multifactor authentication
  • Darknet monitoring
  • Secure Internet connection
  • Data encryption
  • Secure email
  • Mobile security

Summary and Next Steps

Requirements

Basics of computer use
Basics of internet and email use

 7 Hours

Testimonials (1)

Related Courses

CRISC - Certified in Risk and Information Systems Control

21 Hours

CRISC - Certified in Risk and Information Systems Control - 4 Days

28 Hours

IBM Qradar SIEM: Beginner to Advanced

14 Hours

Certified Chief Information Security Officer (CCISO)

35 Hours

CEH - Certified Ethical Hacker v12

35 Hours

Certified Penetration Testing Professional - CPENT

35 Hours

EC-COUNCIL CERTIFIED INCIDENT HANDLER (ECIH)

21 Hours

Incident Response

21 Hours

Threat Hunting

21 Hours

Open Source Intelligence (OSINT) Advanced

21 Hours

Open Source Cyber Intelligence - Introduction

7 Hours

Fundamentals of Corporate Cyber Warfare

14 Hours

Certificate of Cloud Security Knowledge

14 Hours

Application Security for Developers

21 Hours

Android Security

14 Hours

Related Categories