cybersecurity
DESCRIPTION
Cyber-security Training SlidesTRANSCRIPT
Prepared by
Jumanne Mtambalike
Tony Severine
CYBER SECURITY AND ETHICAL HACKING
WE ARE NOT DOING THIS……
THE SECURITY CROWD
CONTENTS
• Introduction to cyber-security
• Types of cyber crimes
• Understanding terminologies
• Documentation and Reports
• Cyber security Tanzania Perspective
• Cyber security Africa Perspective
• Global attack trends
• Overcoming Cyber Crimes
INTRODUCTION TO CYBER-SECURITY
•What is cyber security
TYPES OF CYBERCRIMES
• Phishing
• Hacking
• Vishing
• Cyber stalking
• Cross site scripting (XSS)
• Bot Networks
• Cyber squatting
UNDERSTANDING TERMINOLOGIES
• Malicious codes
• Spam
• Intrusion
• Scam
• Phishing site
• Hacker
• Denial of Service (DOS)
• Cyber terminologies (Cyber terrorism, Cyber wars, etc.)
• Offensive and Defensive security
• Virus, malware, worms and spyware
• Cyber Espionage
DOCUMENTATION AND REPORTS
• Cyber Security IEEE Report by Jumanne Mtambalike
• Crime Scenario in India by Dr. B. Muthukumaran
• Cybercrime Report Tanzania
• Ethical Hacking Presentation by Pratheeba Murugesan
CYBER SECURITY @ TANZANIA PERSPECTIVE
• News Report
• Reference Documents
• Governments Initiative
• Cyber laws and Implementation
• Statistics and Records
• Government Position
• The future
CYBER SECURITY @ AFRICAN PERSPECTIVE
• Overview
• Statistics and Report
• Associations
• On the News
• The future
GLOBAL CYBER SECURITY TRENDS
• Europe
• South America
• North America
• Asia
• Australia
OVERCOMING CYBERCRIMES
• Security Policy and Legal Framework
• Law Enforcement Agency
• Research and Development
• International Collaboration
FUTURE OF CYBER SECURITY OPEN DISCUSSION
PRACTICAL SESSION
• PRACTICAL #1: EXPLORING PHISHING SITES
• PRACTICAL #2: EXPLORING SPAM LETTERS AND JUNK MAILS
• PRACTICAL #3: SPYING ONLINE ACTIVITIES OF A VICTIM
• PRACTICAL #4: EXPLORING SOCIAL ENGINEERING
• PRACTICAL #5: TESTING VULNERABILITY OF A NETWORK
• PRACTICAL #6: HACKING WEBMAILS ACCOUNTS
• PRACTICAL #7: CREATING ADVANCED LOGIN SYSTEM
• PRACTICAL #8: FACEBOOK HACKING
• PRACTICAL #9: WINDOW COMMAND PROMPT HACKING
• PRACTICAL #10: CREATING VIRUSES AND PREVENTION
THANK YOU!!!!!