Course Outline

Introduction

Different Aspects of Enterprise Security

Companies Are More Vulnerable to Cyber Warfare than Governments

  • Corporate espionage (industrial espionage)
  • Corporate sabotage (industrial sabotage)
  • Extortion

Beyond Traditional Enterprise Security

  • Non-standard approaches to breaching your systems
  • Compromising your company...without breaching your systems
  • Artificial Intelligence (AI) in the age of corporate cyber warfare

How AI Will Be Used to Launch the Next Cyber Attack on Your Company

  • Beyond database injection
  • Fooling a company's computers and employees
  • The offensive mindset vs detection mindset

Attack Patterns

  • Systems and tools for launching cyber attacks

Beyond Dumb Bots. Intelligent Bots.

  • Humans or robots?
  • Designing intelligence

Building Comprehensive AI Response Systems

The Future of Corporation Cyber Security in a World of AI, Big Data, and Cyber Warfare

Summary and Next Steps

Requirements

  • Knowledge or interest in cyber security

Audience

  • Cyber security specialists
  • System administrators
  • Cyber security managers
  • Cyber security auditors
  • CIOs
 14 Hours

Number of participants



Price per participant

Testimonials (5)

Related Courses

Certified Information System Security Professional (CISSP) CBK Review

35 Hours

CISM - Certified Information Security Manager

28 Hours

Web Security Testing - Security and Testing of Web Applications using OWASP

21 Hours

Ethical Hacker

35 Hours

CAS for Administrators

7 Hours

Shadowsocks: Set Up a Proxy Server

7 Hours

Network Security Administrator

35 Hours

IoT Security Architecture

14 Hours

Understanding Modern Information Communication Technology

7 Hours

BeyondCorp: Implementing Zero Trust Security

14 Hours

Business Continuity Practitioner

14 Hours

Cyber Crisis & Communications Planning

7 Hours

Automotive Cyber Security Fundamentals

21 Hours

Advanced PHP and Secure Coding Course

35 Hours

Cloud Security Seminar

7 Hours

Related Categories