The rapid increase in the use of and dependence on internet enabled devices by individuals, organizations and governments have facilitated an increase in the attack base for cyber criminals. With the continued dependence of critical infrastructure on technology there is now the need more than ever to secure these devices and protect them for unauthorized access. This course will highlight some of the existing vulnerabilities and threats and technologies used to mitigate same.
The use of the internet and its related devices has increased exponentially in the past 18 months. Individuals, governments and organizations (large and small) rely on these connected devices to function. As these industries embrace new technologies the digital revolution shows no signs of slowing down there is also heighten the exposure cyber risks. This course will highlight some of these risks and provide countermeasure to reduce these risks.
Being online exposes us to cyber criminals and others who commit identity theft, fraud, and harassment. Every time we connect to the Internet using any device our actions influence cybersecurity. Emerging cyber threats require engagement from all to create a safer cyber space, this includes not only government and law enforcement but also the private sector and, most importantly, members of the public.
This Introduction to Artificial Intelligence (AI) course will provide a foundational understanding of AI concepts, techniques, and applications. Students will explore key topics such as machine learning, neural networks, natural language processing, and computer vision while gaining insight into ethical considerations and real-world implementations. Through hands-on exercises and case studies, participants will develop critical thinking skills to analyze AI's impact across industries. By the end of the course, students will have a solid grasp of AI fundamentals and its transformative role in technology and society.
This Cyber Incident Response course will equip students with the knowledge and skills to effectively detect, respond to, and recover from cybersecurity incidents. Covering key topics such as threat identification, incident handling frameworks, forensic analysis, and mitigation strategies, this course provides a hands-on approach to managing cyber threats. Students will explore real-world case studies, learn best practices for minimizing damage, and develop response plans aligned with industry standards. By the end of the course, participants will be prepared to handle cyber incidents with confidence and protect organizational assets from evolving threats.
This course will introduce you to the basics of investigating a computer related incident. It will cover areas such as: Importance of Documentation and Chain of Custody, Challenges of Digital Evidence and reconstruction of scene using digital evidence