Course Outline

Introduction

Threat Actors and Their Motivation

  • Cybercriminals
  • Script kiddies
  • State-sponsored hackers
  • Hacktivists
  • Insiders
  • Researchers / white hat hackers

Types of Cyber Attacks

  • Ransomware
  • Distributed Denial of Service (DDoS)
  • Advanced Persistent Threats (APT)

Tactics and Techniques

  • Phishing, vishing, smishing
  • Malicious devices
  • Physical security breaches
  • Brute force attacks and password spraying
  • APT attacks

Cyber Resilience Strategy for Government

  • MITRE ATT&CK framework
  • Defense-in-depth approach
  • Continuous security monitoring
  • Comprehensive disaster recovery plans

Personal Security

  • Password management and multifactor authentication
  • Darknet surveillance
  • Secure Internet connectivity
  • Data encryption methods
  • Secure email communications
  • Enhanced mobile security measures

Summary and Next Steps

Requirements

Fundamentals of computer operation for government
Essentials of internet and email usage for government

 7 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories