Course Outline

Introduction

Threat Actors and Their Motivation

  • Cybercriminals
  • Script kiddies
  • State-sponsored hackers
  • Hacktivists
  • Insiders
  • Researchers / white hackers

Types of Cyber Attacks

  • Ransomware
  • DDOS
  • APT

Tactics and Techniques

  • Phishing, vishing, smishing
  • Malicious devices
  • Physical security
  • Brute force/password spray
  • APT attacks

Cyber Resilience Strategy

  • MITRE ATT&CK
  • Defense-in-depth
  • Security monitoring
  • Disaster recovery

Personal Security

  • Passwords security and multifactor authentication
  • Darknet monitoring
  • Secure Internet connection
  • Data encryption
  • Secure email
  • Mobile security

Summary and Next Steps

Requirements

Basics of computer use
Basics of internet and email use

 7 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses