Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cyber Security Mastery Logo 1 - Coggle Diagram
Chapter-9 How should Companies adapt their new Security strategy post pandemic?
Make Multi-Factor Authentication Mandatory
Tap into Intelligent Technologies
Practical Security Training for the Remote Workers
Review Security Before Adding Tools
Adopt a Zero Trust Approach
Chapter-1 Cybersecurity – An Overview
Why is it important?
Benefits
Types of cybersecurity
Using Automation in cyber security
Common types of threats
Top cyber security challenges
Chapter-8 Guide to creating the right cybersecurity Budget post pandemic.
Insurance
Consultants
Resource Replacement and Upgrade
Incident Response
Staff and Training Costs
Threat Assessment
Chapter-10 Case Studies
Case 3: Stolen Hospital Laptop Causes Heartburn
Case 4: Hotel CEO Finds Unwelcome Guests in Email Account
Case 2: A Construction Company Gets Hammered by A Keylogger
Case 5: A Dark Web of Issues for A Small Government Contractor
Case 1: A Business Trip to South America Goes South
Chapter-5 A Guide on types of Malwares and how to handle them
Browser Hijacker
Bug
Bots and Botnets
Crimeware
Keyloggers
Backdoors
Malicious Mobile Apps
Adware
Phishing and Social Engineering
Chapter-3 A Guide to Hacking and how to avoid it?
What is hacking?
Types of Hackers and Hacks
How Hacking works
Why hacking is bad?
Tips to stay safe from hacking.
Chapter-6 How to guard yourself from visiting unsafe websites?
Double Check URLs
Note Payment Methods
Use Trusted Retailers
Check Review Sites
Other Website Safety Tests
In-Browser Tools for Website Safety
Check For HTTPS
Chapter-4 How to protect your smartphone from hacking?
Make Smartphone Lock Sooner
Do not Jailbreak
Perform All Software Updates:
Set up Two-Factor Authentication:
Create Long Passcode:
Turn On Erase Data
Chapter-2 Latest Cyber security Trends
More advanced, non-nation state users online will attempt to influence and disrupt.
Internet connectivity providers will need to provision more bandwidth excess.
The internet will become one large, interconnected service factory.
Smart devices will evolve from connected’ to autonomous.
Expect more bad bot problems.
An increase in attacks on remote infrastructure
Ransomware will continue to rule the land.
Chapter-7 Understanding Phishing and Ransomware and how to prevent them.
How to Prevent Ransomware Attacks?
Phishing definition
Who is a target for ransomware?
What is a phishing kit?
How Ransomware works?
Types of phishing
Ransomware definition
How to prevent Phishing attacks?