Add to Wishlist
Understanding Cyber Security
Adoption of Internet by businesses and enterprises has made mobile-banking, online shopping, and social networking possible. Whilst it has opened up a lot of opportunities for us, its not altogether a safe place because its anonymity also harbors cybercriminals. So, to protect yourself against the cyber threats of today, you must have a solid understanding of cybersecurity.
Application security encompasses measures or counter-measures that are taken during the development life-cycle to protect applications from threats that can come through flaws in the application design, development, deployment, upgrade or maintenance.
At the end of this course, you should be able to;
- Understand Cyber Security and Its Importance
- Know various Physical Security and Physical Threats
- Initiate Recovery Plan
- Understand what constitutes Cyber Crime
- Identify Structured and Unstructured Attacks
- Know the Different Kinds of Cyber Crime
- And many more….
Course Curriculum
SECTION 1: INTRODUCTION TO CYBER SECURITY
1
What is Cyber Security?
2
The Importance of Security
3
Insiders and Outsiders
4
Microsoft’s 10 Laws of Cyber Security
5
Physical Security and Physical Threats
6
User tracking
7
Physical Protection of Data
8
Recovery Planning
9
Quiz
SECTION 2: INTRODUCTION TO CYBER CRIME
1
What is Cyber Crime?
2
Cyber Crimes by Insiders and Outsiders
3
Structured and Unstructured Attacks
4
Motivations for Cyber Crime
5
The Different Kinds of Cyber Crime
6
Quiz
SECTION 1: INTRODUCTION TO CYBER SECURITY
SECTION 2: INTRODUCTION TO CYBER CRIME
Be the first to add a review.
Please, login to leave a review