* Cantinho Satkeys

Refresh History
  • Gerard: j'espère que tous sont en train d'être bem
    Hoje às 13:28
  • Gerard: Boas tardes
    Hoje às 13:26
  • FELISCUNHA: ghyt74   49E09B4F  e bom fim de semana   4tj97u<z
    Hoje às 11:51
  • JPratas: try65hytr Pessoal  4tj97u<z classic k7y8j0
    Hoje às 03:29
  • yaro-82: 1994
    07 de Setembro de 2025, 16:49
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  43e5r6
    07 de Setembro de 2025, 10:52
  • j.s.: tenham um excelente fim de semana  49E09B4F
    06 de Setembro de 2025, 17:07
  • j.s.: dgtgtr a todos  4tj97u<z
    06 de Setembro de 2025, 17:07
  • FELISCUNHA: Boa tarde pessoal  49E09B4F bom fim de semana  htg6454y
    05 de Setembro de 2025, 14:53
  • JPratas: try65hytr A Todos  4tj97u<z classic k7y8j0
    05 de Setembro de 2025, 03:10
  • cereal killa: dgtgtr pessoal  4tj97u<z
    03 de Setembro de 2025, 15:26
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    01 de Setembro de 2025, 11:36
  • j.s.: de regresso a casa  535reqef34
    31 de Agosto de 2025, 20:21
  • j.s.: try65hytr a todos  4tj97u<z
    31 de Agosto de 2025, 20:21
  • FELISCUNHA: ghyt74   49E09B4e bom fim de semana  4tj97u<z
    30 de Agosto de 2025, 11:48
  • henrike: try65hytr     k7y8j0
    29 de Agosto de 2025, 21:52
  • JPratas: try65hytr Pessoal 4tj97u<z 2dgh8i classic k7y8j0
    29 de Agosto de 2025, 03:57
  • cereal killa: dgtgtr pessoal  2dgh8i
    27 de Agosto de 2025, 12:28
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  4tj97u<z
    24 de Agosto de 2025, 11:26
  • janstu10: reed
    24 de Agosto de 2025, 10:52

Autor Tópico: The Art of Cyber Attack: Case Studies  (Lida 127 vezes)

0 Membros e 1 Visitante estão a ver este tópico.

Offline mitsumi

  • Sub-Administrador
  • ****
  • Mensagens: 124987
  • Karma: +0/-0
The Art of Cyber Attack: Case Studies
« em: 06 de Março de 2021, 05:18 »

The Art of Cyber Attack: Case Studies
MP4 | h264, 1280x720 | Lang: English | Audio: aac, 44100 Hz | 2h 30m | 564 MB
US 2020 Data Breach, Iran Nuclear Program Attack, Sony Picture Hack, Bangladesh Cyber Heist etc.

What you'll learn
You will learn about cyber attack techniques & tools by studying previous real-life cyber attacks & data breaches
You will be able to learn how to prevent a repeated hacking and attack techniques on you or your organization
You will learn about different malware used for cyber attack and how it can be detected
Requirements
Desire to learn and understand
Description
Important Note: The course can serve as Cyber Security for Beginners course

What will you learn from this course?

You will learn about cyber attacks techniques & tools by studying previous real-life cyber attacks & data breaches

You will be able to learn how to prevent a repeated hacking or attack techniques on you or your organization.

Who                                                                                                                                                                                                                                                  should attend this course

· Anyone interest in Cyber Security, Information Security or/and any Cyber Security professionals with the mandate to protect information system assets

Course Description

The continuous attack on individual, corporate, and government entities operating from cyberspace is becoming alarming. We daily hear of different attacks by different groups of hackers or cybercriminals. These cyber-criminal leverage on known vulnerabilities, in some cases they carry out zero-day attacks and at times, these attacks are repeated on a different organization but the same methodology. It is therefore essential that we study these attacks objectively to know how we as an individual or an organization can become safe from the techniques and tools used by these criminals.

The information security of organizations is the most target of any hacking or APT group. So learning what an organization failed to do that made them a victim of a cyber attack is a piece of knowledge worth knowing.

The case studies will cover cyber attacks, data breaches of known corporate organizations, and government agencies in different countries from 2010 to 2020. The course will have a question at the end of every cyberattack case that has been reviewed. This is will ensure that we all learn from the idea and concepts of each other.

Who this course is for:
Cyber Security Professionals

Download link:
Só visivel para registados e com resposta ao tópico.

Only visible to registered and with a reply to the topic.

Links are Interchangeable - No Password - Single Extraction