Cyber Security
Section outline
-
-
The evolution of Information Communication Technology and growing security concerns demand flexible and generally comprehensive approach to the issue of cyber security. The rapid growth of ICT has raised various complex questions which need to be addressed. This course has been prepared with an aim to create more aware, responsive and responsible digital citizens, thereby contributing effectively to an overall healthy cyber security posture and ecosystem. It aims at equipping a learner with knowledge and skills in ensuring security against cyberattacks in data usage, e-commerce, social media as well as highlighting the laws, regulations, compliance, management and governance of cybersecurity.
The course will be facilitated by Dr. Samali V. Mlay. I look forward to imparting knowledge and also learning from you.
-
Please receive the course outline that will guide this course.
-
-
In this topic, we shall cover
- Cyber security terminologies
- Types of cyber attackers
- Cyber security increasing threat landscape
- Cyber terrorism Vs. Cyber warfare
- Critical IT and National Critical Infrastructure
- Case studies
-
Please watch this video about the greatest hacker in history
-
-
-
To Cover
- Cybercrimes targeting Computer systems
- Cybercrimes targeting Mobiles
- Online scams and frauds
- Social Media Scams and Frauds
- Social Engineering attacks
- Case studies
-
-
-
To Cover:
- End Point device and Mobile phone security
- Password policy
- Security patch management
- Data backup
- Downloading and management of third-party softwar
- Device security policy
- Host firewall and Anti-virus management
- Network security
- Cyber Security best practices
-