Introduction

Lesson 18/33 | Study Time: Min

📚 Recorded Lectures

🔹 Week 1 Recorded Lecture

Watch Now

🔹 Week 2 Recorded Lecture

Watch Now

🔹 Week 3 Recorded Lecture

Watch Now

🔹 Week 4 Recorded Lecture

Watch Now

🔹 Week 5 Recorded Lecture

Watch Now

🔹 Week 6 Recorded Lecture (Link 1)

Watch Now

🔹 Week 6 Recorded Lecture (Link 2)

Watch Now


📂 Supporting Documents











📄 View Document

UeCapmus

UeCapmus

Product Designer
Profile

Class Sessions

1- Introduction 2- Cyber security threats and risks: Understanding the complex nature of cyber security threats and risks. 3- Mega breaches and malware/ransomware attacks: Understanding recent mega breaches and explaining malware and ransomware attacks. 4- Advancements in threats and malicious hackers: Understanding how threats and malicious hackers are advancing and developing customized intrusion tools. 5- Introduction 6- Core vulnerabilities in network and online environments. 7- Security thinking and tools in network environments: Explain how the emergence of security thinking and tools can benefit a network environment. 8- Exploitation of computer networking, web applications, and software. 9- Internal risks and exposure: Evaluate the internal risks and exposure within an organization. 10- Process and physical defenses against network intrusions. 11- Key security concepts in a large and distributed organization. 12- Holistic approach to network and systems resilience. 13- Database security: Protecting databases from compromises of confidentiality, integrity, and availability. 14- Introduction 15- Cloud-based storage solutions: Concepts and models of storing databases in the cloud. 16- Relationship between computer programming and hacking: Understanding the connection between programming skills and hacking abilities. 17- Python programming language: Understanding the features and uses of Python in both non-malicious and malicious hacking. 18- Introduction 19- Incident Response: Understanding the role and composite parts of Incident Response as a business function and how CERTS operate. 20- Aligned task/task forces for Business Continuity, Disaster Recovery, and Crisis Management. 21- Major computer incident investigations. 22- Laws and guidance in relation to the conduct of planned and structured major incident investigations 23- Introduction 24- Strategy and strategic management: Understand the concept of strategy, strategic management, planning, and buy-in in relation to cyber security. 25- Legislation, industry standards, training, and accreditations. 26- Implementation of security and risk management policies. 27- Future legal and technical environment: Understand the future legal and technical environment and its impact on cyber security. 28- Planning and designing a security audit: Understand how to plan and design a security audit for a cyber network. 29- Introduction 30- Threats and risks to traditional and emerging financial services. 31- Architectural structures of traditional and emerging financial markets. 32- Payments systems and their connection to underpinning financial services architecture. 33- Cryptocurrencies and their connection to underpinning financial services architecture.
noreply@uecampus.com
-->