Introduction to Cyber ​​Security (for non-IT professionals)

general goal Currently, cyber security is the most important element of security in civilized countries, especially with the complete shift towards cyber in all aspects of life. The idea of ​​cybersecurity is based on securing the information infrastructure of countries, which is represented in important facilities and important information systems, including electronic government management systems, through which vital state institutions are managed. As well as the military, police, judicial, economic, industrial, commercial and other systems
subsidiary goals
  • Understanding of cybersecurity axes and the threats surrounding it and how to deal with them.
  • Understanding of cyber attacks, how to carry them out, weaknesses and strengths in information systems.
  • Understanding ransomware attacks and how to deal with them.
  • Understanding of international and national mechanisms to protect cyber security.
Course themes
  • Cyber ​​security concept.
  • The basic elements of cyber security.
  • Legal aspects of cyber security protection.
  • Analytical study of Aramco cyber attacks.
  • Analytical study of Estonia cyber attacks and their implications.
  • An analytical study of various attacks around the world.
  • Analysis of the most important statistical sites for cyber attacks.
  • Definition of ransomware.
  • The mechanism of action of ransomware and the target of the attacks committed by it.
  • The most famous ransomware attacks and their effects.
  • How to deal with and prevent attacks.
  • International protection of cybersecurity and regulation of the rules of cyberwarfare (Tallinn Committee for Cybersecurity)
  • The role of the International Telecommunication Union in assessing cyber readiness to deal with cyber attacks.
  • Interpol’s efforts to protect cyber security.
  • Technical assets to deal with information systems in institutions.
  • Cybersecurity threats in industrial and vital institutions.
  • Cyber ​​wars and attacks directed at information systems.
  • Rules for the safe use of information systems in organizations.