Course curriculum

  • 1

    Introduction

    • Meaning of Cyber Security

    • History

    • 1940: The Theory of Reproduction

    • 1950s: The phone phreaks

    • 1960s: Ethical Hacking and Passwords

    • Creeper and the Reaper

    • The Arc Attack

    • 1985: Cold war

    • 1987: The birth of cybersecurity: Antivirus

    • The start of the plague

  • 2

    Viruses

    • 1999 Melissa virus

    • 2010s: The next generation

    • Continued

  • 3

    Causes and Challenges

    • What Causes Cyber Crimes At Such Staggering Rates?

    • Challenges of Cyber Security

  • 4

    Threats

    • Types of Threats

    • Continued

    • Impact

    • Why the sudden rise?

  • 5

    Statistics and Trends

    • Malware

    • Ransomware

    • Cryptojacking

    • Social engineering

    • Phishing

  • 6

    Case Studies & Examples

    • Phishing

    • Malware

    • Malware

    • Malware

    • Malware

    • Malware

    • DDOS attack

    • DDOS attack

  • 7

    Resources

    • Additional Reading

    • External Links / Reference Material

    • Riskpro Video

    • Riskpro Brochure

    • About Riskpro

    • Thank You

  • 8

    Feedback Survey

    • Please Share Your Feedback