By Topic
Pagination
Cyber security exercises are a very effective way of learning the practical aspects of information security. But designing such exercises is not an easy task. This course provides a number of steps and guidelines that should be followed when designing a cyber exercise. The steps include: defining the objectives, choosing an approach, designing network topology, creating a scenario, establishing a set of rules, choosing appropriate metrics and learning lessons. This 3 days training course examines the key elements required to develop Cyber Disaster Response Simulation exercises.
Digital data is exposed to various types of threats while traversing data networks across a wide range of platforms. Understanding the types of threats to which data is exposed is as important as understanding how to protect data from vulnerable systems. This course introduces important concepts in maintaining cyber hygiene and preserving data integrity in the cyberspace. This course teaches how to identify the many digital threats to which various classes of data are exposed.
Global digital growth is continuing to fundamentally transform the lives of people, businesses and institutions, bringing people out of poverty, increasing wider prosperity, welfare and enabling new ways for governments and citizens to engage with each other. It is also creating a more connected world and supporting globalisation with greater access to free markets, democratic systems, prosperity and innovation.
This course aims to provide a student with an understanding of risk management processes according to ISO 27000 and ISO 31000. The content will cover such topics as risk assessment and risk management as a core process for an ISMS, risk handling, and mitigation strategies. Besides that, a general introduction to emergency operation planning, crisis management, and cyber-insurance subjects will be provided.
Global digital growth is continuing to fundamentally transform the lives of people, businesses and institutions, bringing people out of poverty, increasing wider prosperity, welfare and enabling new ways for governments and citizens to engage with each other. It is also creating a more connected world and supporting globalisation with greater access to free markets, democratic systems, prosperity and innovation.
The main objective of this training course is to allow participants to acquire sufficient knowledge on how to empower an incident reponse team for effective incident resolution and mitigate the impact of security threats within their organizations.
Child Online Protection (COP) is a growing concern as children are at risk of violence, abuse, exploitation, and neglect online. Engaging parents in online safety has never been more important since parents and guardians must understand the exact nature of child online engagements. This self-phased course is designed for parents and guardians about child online behaviours, threats and risks associated with cyberspace, and help them build an open conversation about cyber safety in the family setting.
Child Online Protection (COP) is a growing concern as children are at risk of violence, abuse, exploitation, and neglect online. Engaging parents in online safety has never been more important since parents and guardians must understand the exact nature of child online engagements. This self-phased course is designed for parents and guardians about child online behaviours, threats and risks associated with cyberspace, and help them build an open conversation about cyber safety in the family setting.
Artificial Intelligence (AI) technology are developing at a rapid pace, driven by innovation and with recent advances in AI, machines are gaining the ability to learn, improve and make calculated decisions in ways that will enable them to perform tasks previously thought to rely on human experience, creativity, and ingenuity. As the technology continue to evolve, it is important to understand how AI has the potential to help improve cybersecurity efforts.
Ransomware is major techniques that is used by cyber attackers. Victims of Ransomware usually paid their money to attackers for decrypt their valuable files encrypted by Ransomware. This training will enable the participants to understand knowledge of types of Ransomware, encryption, and decryption mechanism of Ransomware. This course also provides hands-on practice with a virtual machine for encryption and decryption techniques used by Ransomware. By the end of this training, participants should be able to have: ⢠Knowledge of Ransomware definition and objective.