Skip to content
Home
About Us
FAQs
Courses
Certified Cyber Security Professional (CCS-PRO)
Cyber Security Awareness
Cyber Security Risk Management
Computer Forensics Foundation Training
Introduction to System and Network Security
Social Engineering Training
Digital Forensics Training
Incident Response Training
Malware Analysis Training
Incident Reporting Training
Fraud Analytics Training Course
Certified Artificial Intelligence (AI) for Cyber Security Professionals Training
Contact Us
Home
About Us
FAQs
Courses
Certified Cyber Security Professional (CCS-PRO)
Cyber Security Awareness
Cyber Security Risk Management
Computer Forensics Foundation Training
Introduction to System and Network Security
Social Engineering Training
Digital Forensics Training
Incident Response Training
Malware Analysis Training
Incident Reporting Training
Fraud Analytics Training Course
Certified Artificial Intelligence (AI) for Cyber Security Professionals Training
Contact Us
Certified Cyber Security Professional
Curriculum
3 Sections
24 Lessons
12 Weeks
Expand all sections
Collapse all sections
Module 1: Cyber Threats Affecting Businesses
11
1.1
Hacking
1.2
Impact of Cyber Threats
1.3
Phishing
1.4
Web Security
1.5
DDOS
1.6
Social Media
1.7
Mobile Devices
1.8
Bring Your Own Device (BYOD)
1.9
Spyware, Malware, and Ransomware
1.10
Malware Symptoms
1.11
Physical Security
Module 2: Actions for Combating Cyber Threats
8
2.1
Passwords
2.2
Encryption Techniques
2.3
Secure Mobile Devices
2.4
Removable Media
2.5
2-Factor Authentication
2.6
Browsing
2.7
Sensitive Data
2.8
General Actions of Combining Cyber Threats
Module 3: Dealing with Risk
5
3.1
Threat Landscape
3.2
Identifying Risk
3.3
Assessing Risk
3.4
Mitigating Risk
3.5
Risk Register
This content is protected, please
login
and
enroll
in the course to view this content!
Sign in
Sign up
Sign in
Don’t have an account?
Sign up
Remember me
Lost your password?
Sign up
Already have an account?
Sign in
Modal title
Main Content