Cybersecurity

1,087 views
1,011 views

Published on

Cyber-security Training Slides

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,087
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
73
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Cybersecurity

  1. 1. Prepared byJumanne MtambalikeTony SeverineCYBER SECURITY AND ETHICAL HACKING
  2. 2. WE ARE NOT DOING THIS……
  3. 3. THE SECURITY CROWD
  4. 4. CONTENTS• Introduction to cyber-security• Types of cyber crimes• Understanding terminologies• Documentation and Reports• Cyber security Tanzania Perspective• Cyber security Africa Perspective• Global attack trends• Overcoming Cyber Crimes
  5. 5. INTRODUCTION TO CYBER-SECURITY•What is cybersecurity
  6. 6. TYPES OF CYBERCRIMES• Phishing• Hacking• Vishing• Cyber stalking• Cross site scripting (XSS)• Bot Networks• Cyber squatting
  7. 7. UNDERSTANDING TERMINOLOGIES• Malicious codes• Spam• Intrusion• Scam• Phishing site• Hacker• Denial of Service (DOS)• Cyber terminologies (Cyber terrorism, Cyber wars, etc.)• Offensive and Defensive security• Virus, malware, worms and spyware• Cyber Espionage
  8. 8. DOCUMENTATION AND REPORTS• Cyber Security IEEE Report by Jumanne Mtambalike• Crime Scenario in India by Dr. B. Muthukumaran• Cybercrime Report Tanzania• Ethical Hacking Presentation by Pratheeba Murugesan
  9. 9. CYBER SECURITY @ TANZANIA PERSPECTIVE• News Report• Reference Documents• Governments Initiative• Cyber laws and Implementation• Statistics and Records• Government Position• The future
  10. 10. CYBER SECURITY @ AFRICAN PERSPECTIVE• Overview• Statistics and Report• Associations• On the News• The future
  11. 11. GLOBAL CYBER SECURITY TRENDS• Europe• South America• North America• Asia• Australia
  12. 12. OVERCOMING CYBERCRIMES• Security Policy and Legal Framework• Law Enforcement Agency• Research and Development• International Collaboration
  13. 13. FUTURE OF CYBER SECURITY OPEN DISCUSSION
  14. 14. PRACTICAL SESSION• PRACTICAL #1: EXPLORING PHISHING SITES• PRACTICAL #2: EXPLORING SPAM LETTERS AND JUNK MAILS• PRACTICAL #3: SPYING ONLINE ACTIVITIES OF A VICTIM• PRACTICAL #4: EXPLORING SOCIAL ENGINEERING• PRACTICAL #5: TESTING VULNERABILITY OF A NETWORK• PRACTICAL #6: HACKING WEBMAILS ACCOUNTS• PRACTICAL #7: CREATING ADVANCED LOGIN SYSTEM• PRACTICAL #8: FACEBOOK HACKING• PRACTICAL #9: WINDOW COMMAND PROMPT HACKING• PRACTICAL #10: CREATING VIRUSES AND PREVENTION
  15. 15. THANK YOU!!!!!

×