IMF Academy

      Cyber Security-Threat Detection

      IMF Academy

      Preis auf Anfrage

      Wichtige informationen

      Tipologie Master
      Methodologie Online
      Dauer 8 Months
      Beginn 18/08/2019
      weitere Termine

      Protect the security and integrity of the data of your organization by earning the Certificate in Cyber Security-Threat Detection.

      Wichtige informationen
      Welche Ziele verfolgt der Kurs?

      Protecting the security and integrity of data is becoming ever more vital for businesses and organizations worldwide. As a graduate of the Certificate in Cyber Security-Threat Detection program, you will have an understanding of the Cyber Security infrastructure as well as the laws and policies dealing with cyber crime. You will examine various methods that are used to threaten cyber systems. As a successful graduate you are able to effectively propose solutions to securing cyber networks and to ensure the online security of your company.

      Ist dieser Kurs für mich?

      The Certificate is targeted at those who want to secure their enterprise and their future - whether you are working as a professional in the public or private sector. When you are an IT Manager, security specialist, technology manager or policy maker, this is the Certificate course for you to protect the security and integrity of the data of your company.

      Voraussetzungen: The Certificate in Cyber Security-Threat Detection is aimed at professionals with a relevant Bachelor or Master’s degree in the field of IT, Business or International Relations, adequate proficiency in the English language and several years of professional experience, who wish to broaden or deepen their knowledge of threat detection.

      Einrichtungen (1)
      Wo und wann
      Beginn Lage
      18 Aug 2019
      21 Okt 2019
      06 Jan 2020
      16 Mär 2020
      Beginn 18 Aug 2019
      21 Okt 2019
      06 Jan 2020
      16 Mär 2020

      Was lernen Sie in diesem Kurs?

      Security Management
      Cyber Security-Threat Detection
      Cyber Security Law and Policy
      Cyber Security Infrastructures
      Introduction to Cyber Security
      Cyber Attacks and counter Cyber attacks
      Future Cyber Technology developments
      Threat Detection


      Course I – Introduction to Cyber Security
      • Introduction to Computer System Architectures
      • Vulnerabilities
      • Critical Infrastructures
      • The growing threat of Social Networks
      • Intelligence and Counter Intelligence
      • International laws
      • Security Policies
      • Privacy and Information Liability
      • Cyber Attacks and counter Cyber attacks
      • Encryption
      • Risk Assessment
      • Cyber Security Forensics including data gathering and data recovery
      • Future Cyber Technology developments

      Course II – Cyber Security Infrastructures
      Growing Cyber Security threat requires increased focus on potential virtual attacks on a country’s critical infrastructure. Both physical and virtual in capacitance of a critical infrastructure such as energy, transport, banking, stock exchange, healthcare and key internet enablers such as e-commerce platforms, social networks and public administration can have a great impact on society. Cyber attacks have and can cripple an industry and the services they provide to millions of users. Critical national and international infrastructures are examined from a Cyber Security perspective.

      Course III – Cyber Security Law and Policy

      • The laws and policies dealing with cyber crime, cyber warfare, privacy and international perspectives
      • In depth look at the Cyber Security strategy of the European Union, The European Union Network and Information Security (NIS) Directive
      • In depth look at the US National Security Act, the US Cyber Security Electronic Act, the Cyber Security Enhancement Act, the Protecting Cyber Security as a National Asset Act, the Communications Assistance for Law Enforcement Act (CALEA)
      • (International) cyber crime laws
      • Review of other current laws and policies

      Course IV – Cyber Security Threat Detection

      • Various methods used to threaten our cyber system such as viruses, spoofing, denial of service, fraud, theft, phishing, spy bots, spam, Trojan horses, e-mail and active malware attachments, viral applications, hardware (computers and portable storage devices) with built-in viruses or trap-doors, fake websites
      • Eaves dropping via wireless networks
      • Criminal access to national, corporate or personal data
      • The growing loss of privacy over social networks