Description
What you’ll learn
-
What are some common consequences of a cyber attack?
-
What are the common cyber threats?
-
What are the various dangerous cybersecurity myths?
-
Why do the cyber criminals launch cyber attacks?
-
What to do if our computer system becomes infected?
- What are some common consequences of a cyber attack?
- Cyber attack can cause financial losses to individuals and organizations. Comment.
- How cyber attack damages an organization’s reputation?
- How a cyber attack can result in the legal and regulatory consequences?
- Does a cyber attack has psychological and emotional impact on individuals who fall victim to cyber attack?
- Why the consequences of a cyber attack can differ from organization to organization?
- Which are the common cyber threats?
- What is meant by malware. How it spreads?
- What is meant by SQL Injection? Why it is used by cyber criminals?
- What is the full form of MITM attacks? What is the purpose of MITM attack?
- How do DoS and DDoS attacks disrupt the normal functioning of a computer system, network or website?
- What is meant by Insider Threats? What is the motive of the insider attacker?
- What is meant by Phishing?
- Cybercriminals are only outsiders? Comment.
- Whether antivirus/anti-malware provide complete protection to our computer system?
- What is the need of changing passwords on a regular basis when we have strong passwords?
- The use of strong passwords is only the start of cyber security measures. Comment.
- Whether cybersecurity is the responsibility of the IT Department alone?
- Do you agree with the statement that an ordinary individual need not worry about cybersecurity? Comment.
- Cybercriminals do not target small and medium sized businesses. Comment.
- Whether BYOD is secure and safe from the cybersecurity point of view?
- What is meant by cybercrime?
- What are the various reasons for which the cyber criminals may launch cyber attacks?
- What is meant by Hacktivism?
- Some individuals do hacking only for recognition. Comment.
- Why do some nation states carry out cyber attacks?
- What are the various steps which can be taken by you if your computer system becomes infected?
- Do you agree with the statement that prevention is the key when it comes to computer infections.
Who this course is for:
- Students, Professionals and General Users
Course content
- Introduction1 lecture • 3min
- Introduction
- Facing Cyber Threats: 7 Consequences and 11 Myths Exposed1 lecture • 10min
- Facing Cyber Threats: 7 Consequences and 11 Myths Exposed
- Types of Cybersecurity Threats1 lecture • 8min
- Types of Cybersecurity Threats
- Dangerous Cybersecurity Myths1 lecture • 22min
- Dangerous Cybersecurity Myths
- Reasons for commission of Cybercrimes1 lecture • 8min
- Reasons for commission of Cybercrimes
- What to do if your Computer system becomes infected?1 lecture • 4min
- What to do if your Computer system becomes infected?
Reviews
There are no reviews yet.