Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Prepared byJumanne MtambalikeTony SeverineCYBER SECURITY AND ETHICAL HACKING
WE ARE NOT DOING THIS……
THE SECURITY CROWD
CONTENTS• Introduction to cyber-security• Types of cyber crimes• Understanding terminologies• Documentation and Reports• C...
INTRODUCTION TO CYBER-SECURITY•What is cybersecurity
TYPES OF CYBERCRIMES• Phishing• Hacking• Vishing• Cyber stalking• Cross site scripting (XSS)• Bot Networks• Cyber squatting
UNDERSTANDING TERMINOLOGIES• Malicious codes• Spam• Intrusion• Scam• Phishing site• Hacker• Denial of Service (DOS)• Cyber...
DOCUMENTATION AND REPORTS• Cyber Security IEEE Report by Jumanne Mtambalike• Crime Scenario in India by Dr. B. Muthukumara...
CYBER SECURITY @ TANZANIA PERSPECTIVE• News Report• Reference Documents• Governments Initiative• Cyber laws and Implementa...
CYBER SECURITY @ AFRICAN PERSPECTIVE• Overview• Statistics and Report• Associations• On the News• The future
GLOBAL CYBER SECURITY TRENDS• Europe• South America• North America• Asia• Australia
OVERCOMING CYBERCRIMES• Security Policy and Legal Framework• Law Enforcement Agency• Research and Development• Internation...
FUTURE OF CYBER SECURITY OPEN DISCUSSION
PRACTICAL SESSION• PRACTICAL #1: EXPLORING PHISHING SITES• PRACTICAL #2: EXPLORING SPAM LETTERS AND JUNK MAILS• PRACTICAL ...
THANK YOU!!!!!
Cybersecurity
Upcoming SlideShare
Loading in …5
×

Cybersecurity

1,223 views

Published on

Cyber-security Training Slides

Published in: Technology
  • Be the first to comment

Cybersecurity

  1. 1. Prepared byJumanne MtambalikeTony SeverineCYBER SECURITY AND ETHICAL HACKING
  2. 2. WE ARE NOT DOING THIS……
  3. 3. THE SECURITY CROWD
  4. 4. CONTENTS• Introduction to cyber-security• Types of cyber crimes• Understanding terminologies• Documentation and Reports• Cyber security Tanzania Perspective• Cyber security Africa Perspective• Global attack trends• Overcoming Cyber Crimes
  5. 5. INTRODUCTION TO CYBER-SECURITY•What is cybersecurity
  6. 6. TYPES OF CYBERCRIMES• Phishing• Hacking• Vishing• Cyber stalking• Cross site scripting (XSS)• Bot Networks• Cyber squatting
  7. 7. UNDERSTANDING TERMINOLOGIES• Malicious codes• Spam• Intrusion• Scam• Phishing site• Hacker• Denial of Service (DOS)• Cyber terminologies (Cyber terrorism, Cyber wars, etc.)• Offensive and Defensive security• Virus, malware, worms and spyware• Cyber Espionage
  8. 8. DOCUMENTATION AND REPORTS• Cyber Security IEEE Report by Jumanne Mtambalike• Crime Scenario in India by Dr. B. Muthukumaran• Cybercrime Report Tanzania• Ethical Hacking Presentation by Pratheeba Murugesan
  9. 9. CYBER SECURITY @ TANZANIA PERSPECTIVE• News Report• Reference Documents• Governments Initiative• Cyber laws and Implementation• Statistics and Records• Government Position• The future
  10. 10. CYBER SECURITY @ AFRICAN PERSPECTIVE• Overview• Statistics and Report• Associations• On the News• The future
  11. 11. GLOBAL CYBER SECURITY TRENDS• Europe• South America• North America• Asia• Australia
  12. 12. OVERCOMING CYBERCRIMES• Security Policy and Legal Framework• Law Enforcement Agency• Research and Development• International Collaboration
  13. 13. FUTURE OF CYBER SECURITY OPEN DISCUSSION
  14. 14. PRACTICAL SESSION• PRACTICAL #1: EXPLORING PHISHING SITES• PRACTICAL #2: EXPLORING SPAM LETTERS AND JUNK MAILS• PRACTICAL #3: SPYING ONLINE ACTIVITIES OF A VICTIM• PRACTICAL #4: EXPLORING SOCIAL ENGINEERING• PRACTICAL #5: TESTING VULNERABILITY OF A NETWORK• PRACTICAL #6: HACKING WEBMAILS ACCOUNTS• PRACTICAL #7: CREATING ADVANCED LOGIN SYSTEM• PRACTICAL #8: FACEBOOK HACKING• PRACTICAL #9: WINDOW COMMAND PROMPT HACKING• PRACTICAL #10: CREATING VIRUSES AND PREVENTION
  15. 15. THANK YOU!!!!!

×