Course Outline
At the end of this course you will be able to demonstrate knowledge and understanding of:
- The history of Cyber Crime
- The effect of Cyber Crime on business
- How to Defend against Cyber Crimes
- The difference between Intellectual Property & Copyrights
- The difference Data Leakage and information Discloser
- How hackers hack e-commerce Applications
- Hacking Human Resource and Financial Applications
- How to Overcoming the Cyber threat
Testimonials (6)
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
Instructor delivery of information; At the end of the day it was Gaurav who pulled off this topic focusing on building strong fundamentals and devising a methodology to be retained with us
Raheal Akhtar - Dubai Government Human Resources Department
Course - Certified Ethical Hacker
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
The simple explanation of the trainer
Mohammed salem - Palestinian Police
Course - Open Source Intelligence (OSINT) Advanced
A wide range of knowledge of the lecturer.