Module 2: Threats and Exploits
Time Required: 1 Hour 30 Minutes
Module 2: Threats and Exploits
Time Required: 1 Hour 30 Minutes
2.1 Module outline and expected learning outcomes
- Learners will be introduced to the risk of cyber threats that individuals and business face and how these threats are managed
2.2 Cyber crime landscape
- Current Cybercrime landscape
- Future landscape
- Examples of critical cyber threats and their consequences
- Cyber terrorism
- Cyber warfare
- Cyber espionage
2.3 Cyber threats
- A review of threat actors:
- Criminals
- Nation state
- Hacktivist
- Insider
- Types of Malware:
- virus
- spyware
- adware
- trojan
- worm
- ransomware
- Review the type of threats:
- data modification
- spam
- phishing
- spear phishing
- Denial-of-Service attack (DoS Attack)
- Distributed Detail of service attach (DDoS attack)
- Man-in-the-middle attacks
- Define zero day vulnerabilities
- Runtime Packers
- Internet Resources (URL scan, VT)
- Malware Analysis
- Static Analysis
- Blackboxing
- Internet research
- Whiteboxing
SHARE THIS STORY ANYWHERE YOU LIKE
SHARE THIS STORY ANYWHERE
Module 6: Governance, Risk and Compliance
Reading Time: 2 minutes Time Required: 1.5 Hours
Module 5: Cybersecurity Tools
Reading Time: 2 minutes Time Required: 1 Hour
Module 4: Digital Forensics
Reading Time: 2 minutes Time Required: 1 Hour