bg_image
Contact Us
معلومات عامة
المدرب / المدربون
عدد الساعات التدريبية
9
فترة الإنعقاد
2024-12-14 - 2024-12-15
أيام النشاط التدريبي
Sunday
التوقيت
09:00 - 15:00
لغة النشاط التدريبي
إنجليزي
المنهجية
وجاهي
نوع التدريب
دورات قصيرة
آخر موعد للتسجيل
Tuesday, 5 December 2023, 2:53 PM
السعر للأردني
72JOD
السعر لغير الأردني
135US$
الوصف العام

This course is designed as a proactive approach to introduce the participant to the cybercrime prevention, detection and incident management processes, policies, procedures and cybercrime governance activities. Focuses on a broad overview of cybercrime management standards, guidelines and procedures as well as the implementation and governance of these activities. The course addresses the implications of universal digitalization and emerging digital transformation technologies on creating exposures for cybercrimes as applied to the police and law enforcement domain. The participant will learn about cybercrime fundamentals, modern cybercrime framework, cybercrime exposures and sources of cybercrimes and risk management as well as technology trends and implications. The participant will also learn how to identify cybercrimes, distinguish between different types of cybercrimes, and how to protect themselves from this kind of attack.

المخرجات

Course Video
المحتويات

Cybercrime, Cybercriminals, and Classifications of Cybercrimes • Cybercrime Fundamentals • Cybercrime Law • Iterative Approach Methodology for Cybercrimes

• The Psychology, Mindset, And Skills of Hackers and Cybercriminals

• Tools & Methods Used in Cybercrimes

• Personal Data Breach

• Phishing / Vishing / Smishing / Pharming

• Identity Theft

• Credit Card Fraud

• Cyber Extortion

• Identity Theft and Government Impersonation

• Malware Dissemination (Virus, Worm, Ransomware, Trojan, Backdoor, …)

• Large Scale Attack (Cyberterrosim, Hacktivism,…)

• Denial of Service (Dos or DDOS)

• Cybervandalism

• Software Piracy and Counterfeiting of Programs • Data Leak • Cybercrime Risk Management

• Authentication (Multifactor Authentication, SSO, OTP, ...)

• Confidentiality and Privacy (Encryption, Anonymization, ...)

• Data Integrity

• Non-Repudiation

• High Availability

• Traceability and History of Electronic Acts and Actors

• Cryptographic Solutions

• Role of PKI Systems and The Electronic Identification

• Digital Signature Mechanisms and Standards

• Cyber Terrorism and Cyber Warfare

• Cost of Cybercrimes • Cybercrime – Illustrations with Case Studies

• The Future of Cybercrimes

• Recommendation on The Protection of The Cybercrimes for Government, Businesses and Individuals.

الفئة المستهدفة

HTML tutorial