Understanding Cyber Security

Adoption of Internet by businesses and enterprises has made mobile-banking, online shopping, and social networking possible. Whilst it has opened up a lot of opportunities for us, its not altogether a safe place because its anonymity also harbors cybercriminals. So, to protect yourself against the cyber threats of today, you must have a solid understanding of cybersecurity.

Application security encompasses measures or counter-measures that are taken during the development life-cycle to protect applications from threats that can come through flaws in the application design, development, deployment, upgrade or maintenance.

At the end of this course, you should be able to;

  • Understand Cyber  Security and Its Importance
  • Know various Physical Security and Physical Threats
  • Initiate Recovery Plan
  • Understand what constitutes Cyber Crime
  • Identify Structured and Unstructured Attacks
  • Know the Different Kinds of Cyber Crime
  • And many more….

Course Curriculum

SECTION 1: INTRODUCTION TO CYBER SECURITY

1
What is Cyber Security?
Self-Paced
2
The Importance of Security
Self-Paced
3
Insiders and Outsiders
Self-Paced
4
Microsoft’s 10 Laws of Cyber Security
Self-Paced
5
Physical Security and Physical Threats
Self-Paced
6
User tracking
Self-Paced
7
Physical Protection of Data
Self-Paced
8
Recovery Planning
Self-Paced
9
Quiz
5 questions

SECTION 2: INTRODUCTION TO CYBER CRIME

1
What is Cyber Crime?
Self-Paced
2
Cyber Crimes by Insiders and Outsiders
Self-Paced
3
Structured and Unstructured Attacks
Self-Paced
4
Motivations for Cyber Crime
Self-Paced
5
The Different Kinds of Cyber Crime
Self-Paced
6
Quiz
5 questions

SECTION 1: INTRODUCTION TO CYBER SECURITY

1
What is Cyber Security?
Self-Paced
2
The Importance of Security
Self-Paced
3
Insiders and Outsiders
Self-Paced
4
Microsoft’s 10 Laws of Cyber Security
Self-Paced
5
Physical Security and Physical Threats
Self-Paced
6
User tracking
Self-Paced
7
Physical Protection of Data
Self-Paced
8
Recovery Planning
Self-Paced
9
Quiz
5 questions

SECTION 2: INTRODUCTION TO CYBER CRIME

1
What is Cyber Crime?
Self-Paced
2
Cyber Crimes by Insiders and Outsiders
Self-Paced
3
Structured and Unstructured Attacks
Self-Paced
4
Motivations for Cyber Crime
Self-Paced
5
The Different Kinds of Cyber Crime
Self-Paced
6
Quiz
5 questions

Be the first to add a review.

Please, login to leave a review
Chat With Us
Need Urgent Help?
Hello!!! Do you need Urgent help?

Our Customer Care Representatives are online and ready to help you via WhatsApp Chat. Get quick response to any of your question.