Cybersecurity - Trends, threats and vulnerabilities - Training Courses | Afi U.

Cybersecurity - Trends, threats and vulnerabilities

Understand the cybersecurity world with this course. Discover the trends, threats and the most exploited vulnerabilities
Private session

This training is available in a private or personalized format. It can be provided in one of our training centres or at your offices. Call one of our consultants of submit a request online.

Call now at 1 877 624.2344

  • Duration: 1 day
  • Regular price: On request

Course outline

Duration : 1 day

© AFI par Edgenda inc.

With this training, participants will acquire awareness and qualification on the cybersecurity world including: the trends, threats and the most exploited vulnerabilities. This session is helpful for any organization concerned about cyber threats. It is now crucial for managers and security professionals to develop knowledge and expertise in this field.

Audience

This training is for managers, IT specialists and information security professionals.

Prerequisites

None

Objectives

After this training, participants will be able :

  • To know and understand the cybersecurity issues.
  • To be aware of the cybersecurity trends and the cyber threats for the upcoming years.
  • To know the major threats (cyber threats) being the triggers for cybersecurity. In other words, who benefits from them.
  • To know which vulnerabilities are mostly exploited by cyber threats.
  • To summarily assess if their organization should be concerned about cybersecurity and if it is a cyber-threats’ target

Contents

What is the cybersecurity - Introduction

  • Why the term “cybersecurity”
  • What cybersecurity is made of
  • The Internet Black Market
  • Which are the different kinds of cybersecurity crimes
  • The main actors
  • Their motivation and goals
  • Their main targets

Cybersecurity trends

  • Cybersecurity historic
  • What are the cybersecurity trends
  • What will be the future for cybersecurity

Cyber threats

  • What is a cyber threat
  • Who are the main actors representing “cyber threats”
  • The opportunists
  • The targeted attacks

The most exploited vulnerabilities

  • What are the main attack vectors used
  • What are the most exploited vulnerabilities
  • Overview on: How not to be an “easy target”