TRAINING PROGRAMME
Cyber Terrorism
Cyber Terrorism primarily focuses on the framework that consist of motivation, target, impact, method of action, domain, and tools of attack. This course provides overview of cyber terrorism framework as well as distinction between cyber terrorism and other types of cyber incidents. It covers existing cyber terrorism frameworks, terrorist use of the Internet and Internet radicalization as well as initiatives in protecting Critical National Information Infrastructure (CNII) against cyber threats in Malaysia. In addition, this course provides a practical hands-on training on cyber-attack lifecycle model.
- To introduce cyber terrorism framework
- To provide understanding of various components of cyber terrorism
- To apply cyber terrorism framework in analysing potential incidents related to cyber terrorism
- To provide practical hands-on training on cyber-attack lifecycle model
All level of participants interested to know about cyber terrorism.
Introduction to Cyber Terrorism
- Definition of cyber threats/incidents
- Cyber threats landscape
- Concept of cyber terrorism
- National Cyber Security Policy (NCSP) and CNII protection against cyber threats
- Internet radicalization and terms
- Internet as enabler of cyber terrorism
- Conceptualizing use of the Internet for terrorist purposes
- Types of activities
- Existing models
- Framework components
- Analysis of cyber terrorism incidents (case study)
- How Cyber Criminals Operate
- Identify and Prevent Intrusions
- Identify possible entry
- Planning for an attack
- Crafting the attack
- Delivering attack
- Sending crafted attack
- Maintaining access
- Backdooring
- Credential harvesting
- Attacking other end-point
- Tunnelling
- Data exfiltration
- 4 - 6 January 2022
- 15 - 17 March 2022
- 7 - 9 June 2022
- 13 - 15 September 2022
- 28 - 30 November 2022
18 CPD Point
Please submit the Certificate of Completion to Global ACE Certification at www.globalace.org
Have any inquiries? Check out the FAQ