Introduction to Cyber Security
Key concepts in Cyber Security
Gaining access to systems – tools of the trade:
Malware
– Virus
– Key Stroke Loggers
– Ransomware
– Trojan Horses
– Denial-of-services Bots/Botnet Software
– Backdoors/Backdoor Agents
– Spyware
– Adware
– Phishing Software
– ATM Malware/Cash Point Malware
– Hacking
– Social Engineering
Types of Cyber Crimes
Phishing
– Email Phishing
– Spear Phishing
– Business Email Compromise/Whaling Attacks/CEO Fraud
– Smishing and Vishing
– Angler Phishing
Spoofing
– Account Takeover and Identity Theft
– Insider Threats
– Distributed Denial of Services Threats (DDoS)
– Ransomware Attacks
– Unauthorised Access and Data Breaches
Quiz
80% Pass Mark
Conclusion
Recap
Downloadable certificate
Key Points
Introduction to Cyber Security
Key concepts in Cyber Security
Gaining access to systems – tools of the trade
Malware
– Virus
– Key Stroke Loggers
– Ransomware
– Trojan Horses
– Denial-of-services Bots/Botnet Software
– Backdoors/Backdoor Agents
– Spyware
– Adware
– Phishing Software
– ATM Malware/Cash Point Malware
– Hacking
– Social Engineering
Types of Cyber Crimes
Phishing
– Email Phishing
– Spear Phishing
– Business Email Compromise/Whaling Attacks/CEO Fraud
– Smishing and Vishing
– Angler Phishing
Spoofing
– Account Takeover and Identity Theft
– Insider Threats
– Distributed Denial of Services Threats (DDoS)
– Ransomware Attacks
– Unauthorised Access and Data Breaches
A day in the life of two unsuspecting cybercriminal targets
Typical scenarios
Key learnings
Quiz
80% Pass Mark
Conclusion
Recap
Downloadable certificate
Introduction to Cyber Security
Key concepts in Cyber Security
Gaining access to systems – tools of the trade
Malware
– Virus
– Key Stroke Loggers
– Ransomware
– Trojan Horses
– Denial-of-services Bots/Botnet Software
– Backdoors/Backdoor Agents
– Spyware
– Adware
– Phishing Software
– ATM Malware/Cash Point Malware
– Hacking
– Social Engineering
Types of Cyber Crimes
Phishing
– Email Phishing
– Spear Phishing
– Business Email Compromise/Whaling Attacks/CEO Fraud
– Smishing and Vishing
– Angler Phishing
Spoofing
– Account Takeover and Identity Theft
– Insider Threats
– Distributed Denial of Services Threats (DDoS)
– Ransomware Attacks
– Unauthorised Access and Data Breaches
A day in the life of two unsuspecting cybercriminal targets
Typical scenarios
Key learnings
Cyber Security and the Law
Risks and Personal Liability
Quiz
80% Pass Mark
Conclusion
Recap
Downloadable certificate