The rapid increase in the use of and dependence on internet enabled devices by individuals, organizations and governments have facilitated an increase in the attack base for cyber criminals. With the continued dependence of critical infrastructure on technology there is now the need more than ever to secure these devices and protect them for unauthorized access. This course will highlight some of the existing vulnerabilities and threats and technologies used to mitigate same.
The use of the internet and its related devices has increased exponentially in the past 18 months. Individuals, governments and organizations (large and small) rely on these connected devices to function. As these industries embrace new technologies the digital revolution shows no signs of slowing down there is also heighten the exposure cyber risks. This course will highlight some of these risks and provide countermeasure to reduce these risk.
Being online exposes us to cyber criminals and others who commit identity theft, fraud, and harassment. Every time we connect to the Internet using any device our actions influence cybersecurity. Emerging cyber threats require engagement from all to create a safer cyber space, this includes not only government and law enforcement but also the private sector and, most importantly, members of the public.
IDENTIFY, MITIGATE, RESPOND
Get your It Team trained to respond to cyber incidents. Training includes, Create a team, policies and plans.
Learn to code in your preferred language with the very best trainers
This course will introduce you to the basics of investigating a computer related incident. It will cover areas such as: Importance of Documentation and Chain of Custody, Challenges of Digital Evidence and reconstruction of scene using digital evidence