By Topic
Digital data is exposed to various types of threats while traversing data networks across a wide range of platforms. Understanding the types of threats to which data is exposed is as important as understanding how to protect data from vulnerable systems. This course introduces important concepts in maintaining cyber hygiene and preserving data integrity in the cyberspace. This course teaches how to identify the many digital threats to which various classes of data are exposed.
This course aims to provide a student with an understanding of risk management processes according to ISO 27000 and ISO 31000. The content will cover such topics as risk assessment and risk management as a core process for an ISMS, risk handling, and mitigation strategies. Besides that, a general introduction to emergency operation planning, crisis management, and cyber-insurance subjects will be provided.
Global digital growth is continuing to fundamentally transform the lives of people, businesses and institutions, bringing people out of poverty, increasing wider prosperity, welfare and enabling new ways for governments and citizens to engage with each other. It is also creating a more connected world and supporting globalisation with greater access to free markets, democratic systems, prosperity and innovation.
The main objective of this training course is to allow participants to acquire sufficient knowledge on how to empower an incident reponse team for effective incident resolution and mitigate the impact of security threats within their organizations.
Child Online Protection (COP) is a growing concern as children are at risk of violence, abuse, exploitation, and neglect online. Engaging parents in online safety has never been more important since parents and guardians must understand the exact nature of child online engagements. This self-phased course is designed for parents and guardians about child online behaviours, threats and risks associated with cyberspace, and help them build an open conversation about cyber safety in the family setting.
Child Online Protection (COP) is a growing concern as children are at risk of violence, abuse, exploitation, and neglect online. Engaging parents in online safety has never been more important since parents and guardians must understand the exact nature of child online engagements. This self-phased course is designed for parents and guardians about child online behaviours, threats and risks associated with cyberspace, and help them build an open conversation about cyber safety in the family setting.
Artificial Intelligence (AI) technology are developing at a rapid pace, driven by innovation and with recent advances in AI, machines are gaining the ability to learn, improve and make calculated decisions in ways that will enable them to perform tasks previously thought to rely on human experience, creativity, and ingenuity. As the technology continue to evolve, it is important to understand how AI has the potential to help improve cybersecurity efforts.
Ransomware is major techniques that is used by cyber attackers. Victims of Ransomware usually paid their money to attackers for decrypt their valuable files encrypted by Ransomware. This training will enable the participants to understand knowledge of types of Ransomware, encryption, and decryption mechanism of Ransomware. This course also provides hands-on practice with a virtual machine for encryption and decryption techniques used by Ransomware. By the end of this training, participants should be able to have: ΓΆΒΆ Knowledge of Ransomware definition and objective.
Cybersecurity is a complex challenge that encompasses multiple different governance, policy, operational, technical and legal aspects. This training provides general knowledge to address, organise and prioritise many of these areas based on existing and well-recognised models, frameworks and other references. The training focuses on elements for protecting civilian aspects of cyberspace and as such, it covers the overarching principles and good practice that need to be considered in the process of drafting, developing and managing a National Cybersecurity Strategy.