Xin chào ! Nếu đây là lần đầu tiên bạn đến với diễn đàn, xin vui lòng danh ra một phút bấm vào đây để đăng kí và tham gia thảo luận cùng VnPro.
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Lịch trình khóa học cybersecurity

    Module 1: Introduction to CyberSecurity

    1.1. Thế giới của CyberSecurity

    1.1.1 What Is Cybersecurity?

    1.1.2 Protecting Your Personal Data

    1.1.3 Your Online Identity

    1.1.4 Your Data

    1.1.5 Where Is Your Data?

    1.1.6 What's More...

    1.1.7 Smart Devices

    1.1.8 What Do Hackers Want?

    1.1.9 Identity Theft

    1.1.10 Who Else Wants My Data?

    1.2. Dữ liệu của tổ chức (Organization of Data)

    1.2.1 Types of Organizational Data

    1.2.2 The Cube

    1.2.3 What Do You Think?

    1.2.4 Is This for Real?

    1.2.5 Data Security Breaches

    1.2.6 Consequences of a Security Breach

    1.3. What was taken?

    1.3.1 Scenario 1

    1.3.2 What Happened?

    1.3.3 Scenario 2

    1.3.4 What Exploits?

    1.3.5 Rewind...

    1.3.6 Key Takeaways

    1.3.7 Find out More

    1.4. Cyber Attacker

    1.4.1 Types of Attackers

    1.4.2 What Color Is My Hat?

    1.4.3 Internal and External Threats

    1.4.4 What Do You Think?

    1.5. CyberWarfare

    1.5.1 Sign of the Times (Stuxnet)

    1.5.2 The Purpose of Cyberwarfare


    Module 2: Attack, Concepts and Techniques

    2.1. Analyzing a CyberAttack

    2.1.1 Types of Malware

    2.1.2 Symptoms of Malware

    2.1.3 What Do You Think?

    2.2. Method of Infiltration

    2.2.1 Social Engineering

    2.2.2 Denial-of-Service

    2.2.3 Distributed DoS

    2.2.4 Botnet

    2.2.5 On-Path Attacks

    2.2.6 SEO Poisoning

    2.2.7 Wi-Fi Password Cracking

    2.2.8 Password Attacks

    2.2.9 Cracking Times

    2.2.10 Advanced Persistent Threats

    2.2.11 It’s Over to You...

    2.3.Security Vulnerable and Expoit

    2.3.1 Hardware Vulnerabilities

    2.3.2 Software Vulnerabilities

    2.3.3 Categorizing Software Vulnerabilities

    2.3.4 Software Updates

    2.3.5 What Do You Think?

    2.4. The CyberSecurity Landscape

    2.4.1 Cryptocurrency

    2.4.2 Cryptojacking


    Module 3: Protecting your Data and Privacy

    3.1. Protecting your Device and Network

    3.1.1 What Do You Think?

    3.1.2 Protecting Your Computing Devices

    3.1.3 Wireless Network Security at Home

    3.1.4 Public Wi-Fi Risks

    3.1.5 Password Security

    3.1.6 A Strong Password

    3.1.7 Using a Passphrase

    3.1.8 Password Guidelines

    3.1.9 Password Check

    3.2. Data Maintenance

    3.2.1 What Is Encryption?

    3.2.2 How Do You Encrypt Your Data?

    3.2.3 Back Up Your Data

    3.2.4 Are They Really Gone?

    3.2.5 How Do You Delete Your Data Permanently?

    3.3. Who owns your data?

    3.3.1 Terms of Service

    3.3.2 Understand the Terms

    3.3.3 What Are You Agreeing To?

    3.3.4 The Data Use Policy

    3.3.5 Privacy Settings

    3.3.6 Before You Sign Up

    3.3.7 Protect Your Data

    3.4. Safeguard your Online privacy

    3.4.1 Two Factor Authentication

    3.4.2 Open Authorization

    3.4.3 Social Sharing

    3.4.4 Don't Get Spoofed

    3.4.5 Email and Web Browser Privacy

    3.5. Discover your online privacy

    3.5.1 Scenario 1

    3.5.2 Scenario 2

    3.5.3 Scenario 3

    3.5.4 Scenario 4

    3.5.5 Scenario 5

    3.5.6 Scenario 6


    Module 4: Protecting the Organization

    4.1. CyberSecurity Devices and Technology

    4.1.1 Security Appliances

    4.1.2 Which Is It?

    4.1.3 Firewalls

    4.1.4 Which One?

    4.1.5 Port Scanning

    4.1.6 What Does It Mean?

    4.1.7 Intrusion Detection and Prevention Systems

    4.1.8 Real-Time Detection

    4.1.9 Protecting Against Malware

    4.1.10 Security Best Practices

    4.2. Behavior approach to CyberSecurity

    4.2.1 Behavior-Based Security

    4.2.2. NetFlow

    4.2.3 Penetration Testing

    4.2.4 Your Turn

    4.2.5 Impact Reduction

    4.2.6 What Is Risk Management?

    4.3. Cisco Approach to CyberSecurity

    4.3.1 Cisco's CSIRT

    4.3.2 Security Playbook

    4.3.3 Tools for Incident Detection and Prevention

    4.3.4 Cisco’s ISE and TrustSec

    4.3.5 Talk the Talk



    Module 5: Will your future be in CyberSecurity?

    5.1. Legal and Ethical Issue

    5.1.1 Legal Issues in Cybersecurity

    5.1.2 Ethical Issues in Cybersecurity

    5.1.3 How did you answer?

    5.1.4 Corporate Ethical Issues

    5.2 Education and Career

    5.2.1 Become a Cybersecurity Guru

    5.2.2 Professional Certifications

    5.2.3 Cybersecurity Career Pathways


    Module 6: FINAL Lab, FINAL EXAM


Working...
X