Objective: Learn to identify common cyber threats and the tactics used by attackers.
Key Topics:
- Phishing: What it is, how to spot it, and how to avoid it.
- Spear-phishing: Targeted attacks and their warning signs.
- Social Engineering: Techniques attackers use to manipulate individuals.
- Malware: Types (viruses, ransomware, spyware) and how they infect devices.
- Insider Threats: How to recognize potential risks from within the company.
- Unsecure: The Risks of Unsecured Networks and Devices
- Case Study: How a Ransomware Attack Crippled a Business
Activity:
- Case study: How a ransomware attack crippled a business.