fbpx
Interested in becoming an agent? | [email protected]

Module 2: Threats and Exploits

  • Time Required: 1 Hour 30 Minutes

Module 2: Threats and Exploits

Time Required: 1 Hour 30 Minutes

2.1 Module outline and expected learning outcomes

  • Learners will be introduced to the risk of cyber threats that individuals and business face and how these threats are managed

2.2 Cyber crime landscape

  • Current Cybercrime landscape
  • Future landscape
  • Examples of critical cyber threats and their consequences
    • Cyber terrorism
    • Cyber warfare
    • Cyber espionage

2.3 Cyber threats

  • A review of threat actors:
    • Criminals
    • Nation state
    • Hacktivist
    • Insider
  • Types of Malware:
    • virus
    • spyware
    • adware
    • trojan
    • worm
    • ransomware
  • Review the type of threats:
    • data modification
    • spam
    • phishing
    • spear phishing
    • Denial-of-Service attack (DoS Attack)
    • Distributed Detail of service attach (DDoS attack)
    • Man-in-the-middle attacks
  • Define zero day vulnerabilities
  • Runtime Packers
  • Internet Resources (URL scan, VT)
  • Malware Analysis
    • Static Analysis
    • Blackboxing
    • Internet research
    • Whiteboxing

SHARE THIS STORY ANYWHERE YOU LIKE

SHARE THIS STORY ANYWHERE

RELATED MODULES

RELATED MODULES

READ MORE
READ MORE

GET STARTED TODAY

Kick starting your Cybersecurity career has never been easier! Simply get started with Genius Armoury via the link below. It’s free and you’ll get certificate of completion at the end!

START TODAY

STAY UP TO DATE

Interested in joining Genius Armoury but not quite ready? Or perhaps you’re just interested in what we’re up to? Join our Newsletter.

    SOCIAL MEDIA

    2022-02-21T22:56:17+11:00

    Go to Top