SlideShare a Scribd company logo

SECURE- Throughout the day - Part 3.pdf

SECURE- Throughout the day - Part 3

1 of 1
Download to read offline
Certificate
SECURE: throughout the day - Episode III
Siemens Information Technology and
the Chief Information Security Officer attest that
Kresimir Popovic
(Z001NVMP)
has successfully completed the Security Online Training
"SECURE: throughout the day Episode III" on Jun 2, 2014.
Training Content
This training program focuses on an on-going and dangerous form of cyber-attack, called Advanced Persistent
Threats (APT). The web-based training shows how these attacks work and which patterns they follow.
Furthermore, handling rules are given to help minimize the risk of a successful APT within our company. A
second key point of the training is the secure usage of Social Media and how to protect against Social
Engineering - both commonly used by potential attackers in order to gain information on their potential target.
Additionally there is a concise characterization of the protection classes and the related handling requirements.
Munich, Jun 2, 2014
This is an automatically generated document and therefore valid without signature.
Siegfried Russwurm
Member of the Managing Board
Responsible for IT
intranet.siemens.com/csts

Recommended

SECURE- Throughout the day - Part 2.pdf
SECURE- Throughout the day - Part 2.pdfSECURE- Throughout the day - Part 2.pdf
SECURE- Throughout the day - Part 2.pdfKresimir Popovic
 
SECURE- Throughout the day - Part 1.pdf
SECURE- Throughout the day - Part 1.pdfSECURE- Throughout the day - Part 1.pdf
SECURE- Throughout the day - Part 1.pdfKresimir Popovic
 
Certificate - Protection against Social Engineering.pdf
Certificate - Protection against Social Engineering.pdfCertificate - Protection against Social Engineering.pdf
Certificate - Protection against Social Engineering.pdfKresimir Popovic
 
Certificate_Secure_Through_The_Day_02
Certificate_Secure_Through_The_Day_02Certificate_Secure_Through_The_Day_02
Certificate_Secure_Through_The_Day_02Patrick Thorpe
 
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...CSCJournals
 

More Related Content

Similar to SECURE- Throughout the day - Part 3.pdf

Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Carol Montgomery Adams
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich TopCyberNewsMAGAZINE
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxlevimax2
 
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODELSECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODELIJCSEIT Journal
 
Credential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social EngineeringCredential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social Engineeringijtsrd
 
CYBER SECURITY COURSES IN KERALA - Offenso
CYBER SECURITY COURSES IN KERALA - OffensoCYBER SECURITY COURSES IN KERALA - Offenso
CYBER SECURITY COURSES IN KERALA - Offensooffcybers
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdfFahadZaman38
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Conkarenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxcroysierkathey
 
Comparative Analysis of Phishing Tools
Comparative Analysis of Phishing ToolsComparative Analysis of Phishing Tools
Comparative Analysis of Phishing Toolsijtsrd
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyGovernment
 
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...Ivanti
 
Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021TrustwaveHoldings
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...IRJET Journal
 

Similar to SECURE- Throughout the day - Part 3.pdf (20)

Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
 
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODELSECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
 
Credential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social EngineeringCredential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social Engineering
 
CYBER SECURITY COURSES IN KERALA - Offenso
CYBER SECURITY COURSES IN KERALA - OffensoCYBER SECURITY COURSES IN KERALA - Offenso
CYBER SECURITY COURSES IN KERALA - Offenso
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
Certificate
CertificateCertificate
Certificate
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdf
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
Comparative Analysis of Phishing Tools
Comparative Analysis of Phishing ToolsComparative Analysis of Phishing Tools
Comparative Analysis of Phishing Tools
 
ICAO SMS M 02 – Basic safety.pptx
ICAO SMS M 02 – Basic safety.pptxICAO SMS M 02 – Basic safety.pptx
ICAO SMS M 02 – Basic safety.pptx
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
 
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
 
Untitled (1).pptx
Untitled (1).pptxUntitled (1).pptx
Untitled (1).pptx
 
Untitled (1).pptx
Untitled (1).pptxUntitled (1).pptx
Untitled (1).pptx
 
Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
 

More from Kresimir Popovic

Amazon_AWS_IAM_2023_Cert.pdf
Amazon_AWS_IAM_2023_Cert.pdfAmazon_AWS_IAM_2023_Cert.pdf
Amazon_AWS_IAM_2023_Cert.pdfKresimir Popovic
 
Functional Programming Principles - 03.06.2013.pdf
Functional Programming Principles - 03.06.2013.pdfFunctional Programming Principles - 03.06.2013.pdf
Functional Programming Principles - 03.06.2013.pdfKresimir Popovic
 
Open_Source_Software_Basics.pdf
Open_Source_Software_Basics.pdfOpen_Source_Software_Basics.pdf
Open_Source_Software_Basics.pdfKresimir Popovic
 
Open_Source_Software_Overview.pdf
Open_Source_Software_Overview.pdfOpen_Source_Software_Overview.pdf
Open_Source_Software_Overview.pdfKresimir Popovic
 
Global Bribery and Corruption Certificate.pdf
Global Bribery and Corruption Certificate.pdfGlobal Bribery and Corruption Certificate.pdf
Global Bribery and Corruption Certificate.pdfKresimir Popovic
 
Siemens Compliance (SIECO).pdf
Siemens Compliance (SIECO).pdfSiemens Compliance (SIECO).pdf
Siemens Compliance (SIECO).pdfKresimir Popovic
 
Global Competition Certificate.pdf
Global Competition Certificate.pdfGlobal Competition Certificate.pdf
Global Competition Certificate.pdfKresimir Popovic
 
udemy - oauth2 and openid crash course.pdf
udemy - oauth2 and openid crash course.pdfudemy - oauth2 and openid crash course.pdf
udemy - oauth2 and openid crash course.pdfKresimir Popovic
 
Udemy-Starting with Quarkus - March 2022.pdf
Udemy-Starting with Quarkus - March 2022.pdfUdemy-Starting with Quarkus - March 2022.pdf
Udemy-Starting with Quarkus - March 2022.pdfKresimir Popovic
 
Kubernetes_DeepDive_02-2022.pdf
Kubernetes_DeepDive_02-2022.pdfKubernetes_DeepDive_02-2022.pdf
Kubernetes_DeepDive_02-2022.pdfKresimir Popovic
 
NGINX Server Deep Dive March 2002.pdf
NGINX Server Deep Dive March 2002.pdfNGINX Server Deep Dive March 2002.pdf
NGINX Server Deep Dive March 2002.pdfKresimir Popovic
 
dockerquickstartlegacy-190215093445.pdf
dockerquickstartlegacy-190215093445.pdfdockerquickstartlegacy-190215093445.pdf
dockerquickstartlegacy-190215093445.pdfKresimir Popovic
 
Remote Communication across cultures - Session.pdf
Remote Communication across cultures - Session.pdfRemote Communication across cultures - Session.pdf
Remote Communication across cultures - Session.pdfKresimir Popovic
 
Atos Financial Management Training.pdf
Atos Financial Management Training.pdfAtos Financial Management Training.pdf
Atos Financial Management Training.pdfKresimir Popovic
 
Stepping out of your comfort zone - Videocast Faculty.pdf
Stepping out of your comfort zone - Videocast Faculty.pdfStepping out of your comfort zone - Videocast Faculty.pdf
Stepping out of your comfort zone - Videocast Faculty.pdfKresimir Popovic
 
Conquering the Challenges of Public Speaking.pdf
Conquering the Challenges of Public Speaking.pdfConquering the Challenges of Public Speaking.pdf
Conquering the Challenges of Public Speaking.pdfKresimir Popovic
 
Capturing and keeping your audience’s attention - Session.pdf
Capturing and keeping your audience’s attention - Session.pdfCapturing and keeping your audience’s attention - Session.pdf
Capturing and keeping your audience’s attention - Session.pdfKresimir Popovic
 
Security and Safety awareness.pdf
Security and Safety awareness.pdfSecurity and Safety awareness.pdf
Security and Safety awareness.pdfKresimir Popovic
 
Analyze and assess your stress - Session.pdf
Analyze and assess your stress - Session.pdfAnalyze and assess your stress - Session.pdf
Analyze and assess your stress - Session.pdfKresimir Popovic
 

More from Kresimir Popovic (20)

Amazon_AWS_IAM_2023_Cert.pdf
Amazon_AWS_IAM_2023_Cert.pdfAmazon_AWS_IAM_2023_Cert.pdf
Amazon_AWS_IAM_2023_Cert.pdf
 
Functional Programming Principles - 03.06.2013.pdf
Functional Programming Principles - 03.06.2013.pdfFunctional Programming Principles - 03.06.2013.pdf
Functional Programming Principles - 03.06.2013.pdf
 
Open_Source_Software_Basics.pdf
Open_Source_Software_Basics.pdfOpen_Source_Software_Basics.pdf
Open_Source_Software_Basics.pdf
 
Open_Source_Software_Overview.pdf
Open_Source_Software_Overview.pdfOpen_Source_Software_Overview.pdf
Open_Source_Software_Overview.pdf
 
Global Bribery and Corruption Certificate.pdf
Global Bribery and Corruption Certificate.pdfGlobal Bribery and Corruption Certificate.pdf
Global Bribery and Corruption Certificate.pdf
 
Siemens Compliance (SIECO).pdf
Siemens Compliance (SIECO).pdfSiemens Compliance (SIECO).pdf
Siemens Compliance (SIECO).pdf
 
Global Competition Certificate.pdf
Global Competition Certificate.pdfGlobal Competition Certificate.pdf
Global Competition Certificate.pdf
 
udemy - oauth2 and openid crash course.pdf
udemy - oauth2 and openid crash course.pdfudemy - oauth2 and openid crash course.pdf
udemy - oauth2 and openid crash course.pdf
 
Udemy-Starting with Quarkus - March 2022.pdf
Udemy-Starting with Quarkus - March 2022.pdfUdemy-Starting with Quarkus - March 2022.pdf
Udemy-Starting with Quarkus - March 2022.pdf
 
Kubernetes_DeepDive_02-2022.pdf
Kubernetes_DeepDive_02-2022.pdfKubernetes_DeepDive_02-2022.pdf
Kubernetes_DeepDive_02-2022.pdf
 
NGINX Server Deep Dive March 2002.pdf
NGINX Server Deep Dive March 2002.pdfNGINX Server Deep Dive March 2002.pdf
NGINX Server Deep Dive March 2002.pdf
 
dockerquickstartlegacy-190215093445.pdf
dockerquickstartlegacy-190215093445.pdfdockerquickstartlegacy-190215093445.pdf
dockerquickstartlegacy-190215093445.pdf
 
Remote Communication across cultures - Session.pdf
Remote Communication across cultures - Session.pdfRemote Communication across cultures - Session.pdf
Remote Communication across cultures - Session.pdf
 
Atos Financial Management Training.pdf
Atos Financial Management Training.pdfAtos Financial Management Training.pdf
Atos Financial Management Training.pdf
 
Stepping out of your comfort zone - Videocast Faculty.pdf
Stepping out of your comfort zone - Videocast Faculty.pdfStepping out of your comfort zone - Videocast Faculty.pdf
Stepping out of your comfort zone - Videocast Faculty.pdf
 
Conquering the Challenges of Public Speaking.pdf
Conquering the Challenges of Public Speaking.pdfConquering the Challenges of Public Speaking.pdf
Conquering the Challenges of Public Speaking.pdf
 
Capturing and keeping your audience’s attention - Session.pdf
Capturing and keeping your audience’s attention - Session.pdfCapturing and keeping your audience’s attention - Session.pdf
Capturing and keeping your audience’s attention - Session.pdf
 
Security and Safety awareness.pdf
Security and Safety awareness.pdfSecurity and Safety awareness.pdf
Security and Safety awareness.pdf
 
Code of Ethics.pdf
Code of Ethics.pdfCode of Ethics.pdf
Code of Ethics.pdf
 
Analyze and assess your stress - Session.pdf
Analyze and assess your stress - Session.pdfAnalyze and assess your stress - Session.pdf
Analyze and assess your stress - Session.pdf
 

Recently uploaded

Cybersecurity Measures For Remote Workers.pdf
Cybersecurity Measures For Remote Workers.pdfCybersecurity Measures For Remote Workers.pdf
Cybersecurity Measures For Remote Workers.pdfCIOWomenMagazine
 
An Introduction to Globus for Researchers
An Introduction to Globus for ResearchersAn Introduction to Globus for Researchers
An Introduction to Globus for ResearchersGlobus
 
Automation for Bonterra Impact Management (fka Apricot)
Automation for Bonterra Impact Management (fka Apricot)Automation for Bonterra Impact Management (fka Apricot)
Automation for Bonterra Impact Management (fka Apricot)Jeffrey Haguewood
 
Globus for System Administrators
Globus for System AdministratorsGlobus for System Administrators
Globus for System AdministratorsGlobus
 
Alluxio Monthly Webinar | Why a Multi-Cloud Strategy Matters for Your AI Plat...
Alluxio Monthly Webinar | Why a Multi-Cloud Strategy Matters for Your AI Plat...Alluxio Monthly Webinar | Why a Multi-Cloud Strategy Matters for Your AI Plat...
Alluxio Monthly Webinar | Why a Multi-Cloud Strategy Matters for Your AI Plat...Alluxio, Inc.
 
Orion Context Broker introduction 20240227
Orion Context Broker introduction 20240227Orion Context Broker introduction 20240227
Orion Context Broker introduction 20240227Fermin Galan
 
Instrument Data Automation: The Life of a Flow
Instrument Data Automation: The Life of a FlowInstrument Data Automation: The Life of a Flow
Instrument Data Automation: The Life of a FlowGlobus
 
Machine Learning Basics for Dummies (no math!)
Machine Learning Basics for Dummies (no math!)Machine Learning Basics for Dummies (no math!)
Machine Learning Basics for Dummies (no math!)Dmitry Zinoviev
 
How AI is preventing account fraud at web scale
How AI is preventing account fraud at web scaleHow AI is preventing account fraud at web scale
How AI is preventing account fraud at web scaleAmir Moghimi
 
Open Source vs Closed Source LLMs. Pros and Cons
Open Source vs Closed Source LLMs. Pros and ConsOpen Source vs Closed Source LLMs. Pros and Cons
Open Source vs Closed Source LLMs. Pros and ConsSprings
 
Joseph Yoder : Being Agile about Architecture
Joseph Yoder : Being Agile about ArchitectureJoseph Yoder : Being Agile about Architecture
Joseph Yoder : Being Agile about ArchitectureHironori Washizaki
 
Agile & Scrum, Certified Scrum Master! Crash Course
Agile & Scrum,  Certified Scrum Master! Crash CourseAgile & Scrum,  Certified Scrum Master! Crash Course
Agile & Scrum, Certified Scrum Master! Crash CourseRohan Chandane
 
Implementing Docker Containers with Windows Server 2019
Implementing Docker Containers with Windows Server 2019Implementing Docker Containers with Windows Server 2019
Implementing Docker Containers with Windows Server 2019VICTOR MAESTRE RAMIREZ
 
killing camp 주차장 나누기-2 topology sort.pdf
killing camp 주차장 나누기-2 topology sort.pdfkilling camp 주차장 나누기-2 topology sort.pdf
killing camp 주차장 나누기-2 topology sort.pdfssuser82c38d
 
Best Practices for Data Sharing Using Globus
Best Practices for Data Sharing Using GlobusBest Practices for Data Sharing Using Globus
Best Practices for Data Sharing Using GlobusGlobus
 
LLMOps with Azure Machine Learning prompt flow
LLMOps with Azure Machine Learning prompt flowLLMOps with Azure Machine Learning prompt flow
LLMOps with Azure Machine Learning prompt flowNaoki (Neo) SATO
 
From Software Development To Branding through Digital Marketing, IT Services
From Software Development To Branding through Digital Marketing, IT ServicesFrom Software Development To Branding through Digital Marketing, IT Services
From Software Development To Branding through Digital Marketing, IT ServicesAnisha Agarwal
 
Design pattern talk by Kaya Weers - 2024
Design pattern talk by Kaya Weers - 2024Design pattern talk by Kaya Weers - 2024
Design pattern talk by Kaya Weers - 2024Kaya Weers
 
killingcamp longest common subsequence.pdf
killingcamp longest common subsequence.pdfkillingcamp longest common subsequence.pdf
killingcamp longest common subsequence.pdfssuser82c38d
 
Workshop híbrido: Stream Processing con Flink
Workshop híbrido: Stream Processing con FlinkWorkshop híbrido: Stream Processing con Flink
Workshop híbrido: Stream Processing con Flinkconfluent
 

Recently uploaded (20)

Cybersecurity Measures For Remote Workers.pdf
Cybersecurity Measures For Remote Workers.pdfCybersecurity Measures For Remote Workers.pdf
Cybersecurity Measures For Remote Workers.pdf
 
An Introduction to Globus for Researchers
An Introduction to Globus for ResearchersAn Introduction to Globus for Researchers
An Introduction to Globus for Researchers
 
Automation for Bonterra Impact Management (fka Apricot)
Automation for Bonterra Impact Management (fka Apricot)Automation for Bonterra Impact Management (fka Apricot)
Automation for Bonterra Impact Management (fka Apricot)
 
Globus for System Administrators
Globus for System AdministratorsGlobus for System Administrators
Globus for System Administrators
 
Alluxio Monthly Webinar | Why a Multi-Cloud Strategy Matters for Your AI Plat...
Alluxio Monthly Webinar | Why a Multi-Cloud Strategy Matters for Your AI Plat...Alluxio Monthly Webinar | Why a Multi-Cloud Strategy Matters for Your AI Plat...
Alluxio Monthly Webinar | Why a Multi-Cloud Strategy Matters for Your AI Plat...
 
Orion Context Broker introduction 20240227
Orion Context Broker introduction 20240227Orion Context Broker introduction 20240227
Orion Context Broker introduction 20240227
 
Instrument Data Automation: The Life of a Flow
Instrument Data Automation: The Life of a FlowInstrument Data Automation: The Life of a Flow
Instrument Data Automation: The Life of a Flow
 
Machine Learning Basics for Dummies (no math!)
Machine Learning Basics for Dummies (no math!)Machine Learning Basics for Dummies (no math!)
Machine Learning Basics for Dummies (no math!)
 
How AI is preventing account fraud at web scale
How AI is preventing account fraud at web scaleHow AI is preventing account fraud at web scale
How AI is preventing account fraud at web scale
 
Open Source vs Closed Source LLMs. Pros and Cons
Open Source vs Closed Source LLMs. Pros and ConsOpen Source vs Closed Source LLMs. Pros and Cons
Open Source vs Closed Source LLMs. Pros and Cons
 
Joseph Yoder : Being Agile about Architecture
Joseph Yoder : Being Agile about ArchitectureJoseph Yoder : Being Agile about Architecture
Joseph Yoder : Being Agile about Architecture
 
Agile & Scrum, Certified Scrum Master! Crash Course
Agile & Scrum,  Certified Scrum Master! Crash CourseAgile & Scrum,  Certified Scrum Master! Crash Course
Agile & Scrum, Certified Scrum Master! Crash Course
 
Implementing Docker Containers with Windows Server 2019
Implementing Docker Containers with Windows Server 2019Implementing Docker Containers with Windows Server 2019
Implementing Docker Containers with Windows Server 2019
 
killing camp 주차장 나누기-2 topology sort.pdf
killing camp 주차장 나누기-2 topology sort.pdfkilling camp 주차장 나누기-2 topology sort.pdf
killing camp 주차장 나누기-2 topology sort.pdf
 
Best Practices for Data Sharing Using Globus
Best Practices for Data Sharing Using GlobusBest Practices for Data Sharing Using Globus
Best Practices for Data Sharing Using Globus
 
LLMOps with Azure Machine Learning prompt flow
LLMOps with Azure Machine Learning prompt flowLLMOps with Azure Machine Learning prompt flow
LLMOps with Azure Machine Learning prompt flow
 
From Software Development To Branding through Digital Marketing, IT Services
From Software Development To Branding through Digital Marketing, IT ServicesFrom Software Development To Branding through Digital Marketing, IT Services
From Software Development To Branding through Digital Marketing, IT Services
 
Design pattern talk by Kaya Weers - 2024
Design pattern talk by Kaya Weers - 2024Design pattern talk by Kaya Weers - 2024
Design pattern talk by Kaya Weers - 2024
 
killingcamp longest common subsequence.pdf
killingcamp longest common subsequence.pdfkillingcamp longest common subsequence.pdf
killingcamp longest common subsequence.pdf
 
Workshop híbrido: Stream Processing con Flink
Workshop híbrido: Stream Processing con FlinkWorkshop híbrido: Stream Processing con Flink
Workshop híbrido: Stream Processing con Flink
 

SECURE- Throughout the day - Part 3.pdf

  • 1. Certificate SECURE: throughout the day - Episode III Siemens Information Technology and the Chief Information Security Officer attest that Kresimir Popovic (Z001NVMP) has successfully completed the Security Online Training "SECURE: throughout the day Episode III" on Jun 2, 2014. Training Content This training program focuses on an on-going and dangerous form of cyber-attack, called Advanced Persistent Threats (APT). The web-based training shows how these attacks work and which patterns they follow. Furthermore, handling rules are given to help minimize the risk of a successful APT within our company. A second key point of the training is the secure usage of Social Media and how to protect against Social Engineering - both commonly used by potential attackers in order to gain information on their potential target. Additionally there is a concise characterization of the protection classes and the related handling requirements. Munich, Jun 2, 2014 This is an automatically generated document and therefore valid without signature. Siegfried Russwurm Member of the Managing Board Responsible for IT intranet.siemens.com/csts