Description
What you’ll learn
-
The students will learn the best practices for securing personal and organizational data.
-
The students will gain a deep understanding of the importance of cybersecurity.
-
The students will learn about the various impacts and outcomes resulting from cyber attacks.
-
The students will gain essential knowledge about the different types of cybersecurity threats.
-
The students will gain understanding of various misconceptions about cybersecurity.
-
The students will understand that cybercrimes are committed for various reasons such as money, personal revenge, fun or recognition
-
The students will understand the importance of incident response plan in the context of cyber security.
-
What is the meaning of Cybersecurity?
-
What is ultimate aim of cybersecurity?
-
How may new malwares are created everyday?
-
What is the most common motivation behind data breaches?
-
How many percentage of data breaches involve a human element?
-
How much cyberattacks out of all cyberattacks are committed against small to midsize businesses?
-
Why should we update our software and operating system?
-
We should use only reliable security software. Why?
-
How can we impart training and create awareness in our employees regarding cybersecurity?
-
What are those points which we should keep in mind with regard to creation or use of passwords?
-
Why should we be cautious if the email comes from unknown sender?
-
What is the need to regularly backup our data?
-
Why should we uninstall unnecessary software from our computers?
-
How to recognize that a particular site is a secure site?
-
What is the benefit of inserting firewalls?
-
Why should we educate ourselves about online threats?
-
What is meant by two-factor authentication in cybersecurity?
-
What is patch management?
-
Why there is need to exercise care while visiting social networking sites?
-
Cybersecurity measures protect the sensitive data from whom?
-
Cybersecurity is important in today’s digital world due to various reasons. What are those?
-
How cybersecurity measures help in preserving brand reputation?
-
Why the importance of cybersecurity continues to grow?
-
Whether all the industries are at equal risk from cyber criminals? Comment.
-
Individuals and small industries are not entirely risk free from cyber attacks. Why?
-
It is a mistake to believe that you are of no interest to cyber attackers. Comment.
-
What are the various benefits of cybersecurity measures?
-
Whether Cybersecurity measures inspire confidence in your customers? Comment.
-
How cybersecurity measures enhance national security?
-
Cybersecurity measures help in continuity of business operations. Comment.
-
How cybersecurity measures are beneficial for mental health?
-
What are some common consequences of a cyber attack?
-
Cyber attack can cause financial losses to individuals and organizations. Comment.
-
How cyber attack damages an organization’s reputation?
-
How a cyber attack can result in the legal and regulatory consequences?
-
Does a cyber attack has psychological and emotional impact on individuals who fall victim to cyber attack?
-
Why the consequences of a cyber attack can differ from organization to organization?
-
Which are the common cyber threats?
-
What is meant by malware. How it spreads?
-
What is meant by SQL Injection? Why it is used by cyber criminals?
-
What is the full form of MITM attacks? What is the purpose of MITM attack?
-
How do DoS and DDoS attacks disrupt the normal functioning of a computer system, network or website?
-
What is meant by Insider Threats? What is the motive of the insider attacker?
-
What is meant by Phishing?
-
Cybercriminals are only outsiders? Comment.
-
Whether antivirus/anti-malware provide complete protection to our computer system?
-
What is the need of changing passwords on a regular basis when we have strong passwords?
-
The use of strong passwords is only the start of cyber security measures. Comment.
-
Whether cybersecurity is the responsibility of the IT Department alone?
-
Do you agree with the statement that an ordinary individual need not worry about cybersecurity? Comment.
-
Cybercriminals do not target small and medium sized businesses. Comment.
-
Whether BYOD is secure and safe from the cybersecurity point of view?
-
What is meant by cybercrime?
-
What are the various reasons for which the cyber criminals may launch cyber attacks?
-
What is meant by Hacktivism?
-
Some individuals do hacking only for recognition. Comment.
-
Why do some nation states carry out cyber attacks?
-
What are the various steps which can be taken by you if your computer system becomes infected?
-
Do you agree with the statement that prevention is the key when it comes to computer infections.
-
After 2020 pandemic, more people are working from home. Discuss it from the angle of cyber security.
-
What is meant by targeted ransomware attack?
-
How do the cyber criminals select their targets for targeted ransomware attack?
-
What is the purpose of cyber criminals behind targeted ransomware attack?
-
What is meant by Zero-day flaw?
-
When zero-day flaw comes known to the public?
-
What is meant by social engineering?
-
What is meant by spear phishing? What is the goal of spear phishing?
-
Insider Threats are on the rise? Comment.
-
What is meant by an insider threat?
-
Which are those industries which are worst hit by insider threats?
-
What is meant by cloud with reference to cyber security?
-
Why cloud has become an attractive target for cybercriminals?
-
What are the top threats faced by the organizations in the cloud?
-
What should the organizations do to protect their cloud-based data?
-
IoT devices are increasing year by year. Comment with reference to cyber security.
-
Why the demand for cybersecurity professionals is increasing?
-
Cyber insurance instantly solves all your cyber security issues? Comment.
-
What is meant by zero trust architecture?
-
Mobile is the new target of cyber criminals. Why?
-
What is meant by BYOD?
-
Artificial intelligence is changing the landscape of cybersecurity. Comment.
-
What is the benefit of blockchain technology?
-
What is meant by DevSecOps?
-
What is homomorphic encryption?
-
What is the goal of post-quantum cryptography?
-
What is the benefit of biometric technologies?
-
What is the benefit of EDR solutions?
-
Cybersecurity is a broad concept. Comment.
-
What is meant by Network security?
-
Which are some key aspects of network security?
-
What is meant by Network access control?
-
What is Network segmentation?
-
What is meant by Firewall?
-
What is the benefit of Virtual Private Network?
-
What is the purpose of Intrusion Detection and prevention system?
-
What is meant by wireless network security?
-
Why wireless networks are inherently more prone to attacks than wired networks?
-
Which measures can be taken for wireless network security?
-
What is meant by encryption?
-
What is the benefit of strong authentication mechanisms?
-
What is meant by firmware?
-
What is WPS button?
-
What is meant by Web Security?
-
What measures can be taken to ensure web security?
-
What is the full form of HTTPS? What is the usage of HTTPS?
-
What do you mean by strong password policies?
-
What is meant by mobile security?
-
What measures can be taken to ensure mobile security?
-
From where should we download mobile apps?
-
What is meant by App Permissions Management?
-
What is the purpose of Mobile Device Security Software?
-
What is the benefit of secure data backup and storage?
-
What is meant by remote tracking?
-
What is the benefit of enabling remote wiping feature on mobile device?
-
What is meant by incident response?
-
Incident response team includes representatives from different departments. Comment.
-
What is the responsibility of incident response team?
-
Why incident response plan is important?
-
What are the key steps involved in the incident response process?
-
What is the benefit of conducting post-incident review?
-
What do you know about the recovery phase of incident response process?
-
How can we regularly update incident response plan?
-
What is meant by cybersecurity compliance?
-
What happens if the organization does not comply with cybersecurity regulations?
Who this course is for:
- Students, Small Business Owners, Technology Enthusiasts and General Public
Course content
- Introduction8 lectures • 30min
- Introduction
- Cyber Security Essentials: 18 Expert Tips for Protection7 lectures • 46min
- Cyber Security Essentials: 18 Expert Tips for Protection
- Facing Cyber Threats: 7 Consequences and 11 Myths Exposed6 lectures • 56min
- Facing Cyber Threats: 7 Consequences and 11 Myths Exposed
- Cyber Security’s Frontier: Emerging Trends and Technologies5 lectures • 51min
- Cyber Security’s Frontier: Emerging Trends and Technologies
- Cyber Security Uncovered: From Basics to Complexity7 lectures • 54min
- Cyber Security Uncovered: From Basics to Complexity
Reviews
There are no reviews yet.