Section outline

    • In this part of topic 2, we shall cover;

      1.      Information security Threats

      • Types
      • Mitigation strategies

       2.      Information Security Risks

      • Types
      • Mitigation strategies

    • This part of topic 2 will introduce us to an overview of cyber crime. It will cover; 

      • Cyber security terminologies
      • Types of cyber attackers
      • Cyber security increasing threat landscape
      • Cyber terrorism Vs. Cyber warfare
      • Critical IT and National Critical Infrastructure
      • Case studies

    • This last part of Topic 3 will enable us dig into the various categories of cybercrime. Specifically we shall delve into the following;

      • Cybercrimes targeting Computer systems
      • Cybercrimes targeting Mobiles
      • Online scams and frauds
      • Social Media Scams and Frauds
      • Social Engineering attacks
      • Case studies
      You are encouraged to search for more in order to protect yourself against cybercrime.

    • This video will give you a glimpse into Kevin David Mitnick's life journey as an Expert Hacker who later became a Security Expert. He is renown as the Greatest Hacker in the World.

    • For learning purposes, share here the various forms of cybercrime that you or someone you know have experienced. Additionally, share the lessons learnt from the cyber crime and advise on how to protect ourselves against them.