Get in Touch

Course Outline

Introduction

Threat Actors and Their Motivations

  • Cybercriminals
  • Script kiddies
  • State-sponsored hackers
  • Hacktivists
  • Insiders
  • Researchers / white hat hackers

Types of Cyber Attacks

  • Ransomware
  • DDoS
  • APT

Tactics and Techniques

  • Phishing, vishing, and smishing
  • Malicious devices
  • Physical security
  • Brute force and password spraying
  • APT attacks

Cyber Resilience Strategy

  • MITRE ATT&CK
  • Defense in depth
  • Security monitoring
  • Disaster recovery

Personal Security

  • Password security and multifactor authentication
  • Darknet monitoring
  • Secure internet connections
  • Data encryption
  • Secure email practices
  • Mobile security

Summary and Next Steps

Requirements

Basic computer proficiency
Fundamental knowledge of internet and email usage

 7 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories