Description
What you’ll learn
-
What are some common consequences of a cyber attack?
-
What are the common cyber threats?
-
What are the various dangerous cybersecurity myths?
-
Why do the cyber criminals launch cyber attacks?
-
What to do if our computer system becomes infected?
-
What are some common consequences of a cyber attack?
-
Cyber attack can cause financial losses to individuals and organizations. Comment.
-
How cyber attack damages an organization’s reputation?
-
How a cyber attack can result in the legal and regulatory consequences?
-
Does a cyber attack has psychological and emotional impact on individuals who fall victim to cyber attack?
-
Why the consequences of a cyber attack can differ from organization to organization?
-
Which are the common cyber threats?
-
What is meant by malware. How it spreads?
-
What is meant by SQL Injection? Why it is used by cyber criminals?
-
What is the full form of MITM attacks? What is the purpose of MITM attack?
-
How do DoS and DDoS attacks disrupt the normal functioning of a computer system, network or website?
-
What is meant by Insider Threats? What is the motive of the insider attacker?
-
What is meant by Phishing?
-
Cybercriminals are only outsiders? Comment.
-
Whether antivirus/anti-malware provide complete protection to our computer system?
-
What is the need of changing passwords on a regular basis when we have strong passwords?
-
The use of strong passwords is only the start of cyber security measures. Comment.
-
Whether cybersecurity is the responsibility of the IT Department alone?
-
Do you agree with the statement that an ordinary individual need not worry about cybersecurity? Comment.
-
Cybercriminals do not target small and medium sized businesses. Comment.
-
Whether BYOD is secure and safe from the cybersecurity point of view?
-
What is meant by cybercrime?
-
What are the various reasons for which the cyber criminals may launch cyber attacks?
-
What is meant by Hacktivism?
-
Some individuals do hacking only for recognition. Comment.
-
Why do some nation states carry out cyber attacks?
-
What are the various steps which can be taken by you if your computer system becomes infected?
-
Do you agree with the statement that prevention is the key when it comes to computer infections.
Who this course is for:
- Students, Professionals and General Users
Course content
- Introduction1 lecture • 3min
- Introduction
- Facing Cyber Threats: 7 Consequences and 11 Myths Exposed1 lecture • 10min
- Facing Cyber Threats: 7 Consequences and 11 Myths Exposed
- Types of Cybersecurity Threats1 lecture • 8min
- Types of Cybersecurity Threats
- Dangerous Cybersecurity Myths1 lecture • 22min
- Dangerous Cybersecurity Myths
- Reasons for commission of Cybercrimes1 lecture • 8min
- Reasons for commission of Cybercrimes
- What to do if your Computer system becomes infected?1 lecture • 4min
- What to do if your Computer system becomes infected?
Reviews
There are no reviews yet.