fbpx
Interested in becoming an agent?|agents@geniusarmoury.com

Module 2: Threats and Exploits

  • Time Required: 1 Hour 30 Minutes

Module 2: Threats and Exploits

Time Required: 1 Hour 30 Minutes

2.1 Module outline and expected learning outcomes

  • Learners will be introduced to the risk of cyber threats that individuals and business face and how these threats are managed

2.2 Cyber crime landscape

  • Current Cybercrime landscape
  • Future landscape
  • Examples of critical cyber threats and their consequences
    • Cyber terrorism
    • Cyber warfare
    • Cyber espionage

2.3 Cyber threats

  • A review of threat actors:
    • Criminals
    • Nation state
    • Hacktivist
    • Insider
  • Types of Malware:
    • virus
    • spyware
    • adware
    • trojan
    • worm
    • ransomware
  • Review the type of threats:
    • data modification
    • spam
    • phishing
    • spear phishing
    • Denial-of-Service attack (DoS Attack)
    • Distributed Detail of service attach (DDoS attack)
    • Man-in-the-middle attacks
  • Define zero day vulnerabilities
  • Runtime Packers
  • Internet Resources (URL scan, VT)
  • Malware Analysis
    • Static Analysis
    • Blackboxing
    • Internet research
    • Whiteboxing

SHARE THIS STORY ANYWHERE YOU LIKE

SHARE THIS STORY ANYWHERE

RELATED MODULES

RELATED MODULES

READ MORE
READ MORE

REGISTER YOUR INTEREST

Register your interest in becoming a Cybersecurity Guardian.

    If a registrant identifies as being on the autism spectrum, we can provide additional guidance.


    STAY UP TO DATE

    Interested in joining Genius Armoury but not quite ready? Or perhaps you’re just interested in what we’re up to? Join our Newsletter.

      SOCIAL MEDIA

      2021-06-10T14:17:20+10:00

      Go to Top