Course Information
- 2 Jan 2025 (Thu) - 13 Mar 2025 (Thu) 7:00 PM - 10:00 PM
Course Overview
在當今的數碼化時代,企業的數碼資產和數據已經成為最重要的商業資產之一。
然而,這些資產也面臨著日益增長的威脅。網絡攻擊、數據泄露、勒索軟件等各種安全事件都可能對企業造成嚴重的損失,包括財務損失、聲譽損失和法律風險等。因此,保護企業的數字資產已經成為企業必須面臨的重要挑戰之一。
這就是為什麼Cybersecurity的重要性變得越來越大。
Cybersecurity是指保護網絡、電腦系統、移動設備和數據等數碼資產免受未經授權的訪問、使用、修改、破壞或盜竊的技術、措施和實踐。
簡單來說,Cybersecurity是一個企業保護其數碼資產的綜合策略和實踐。
Cybersecurity的重要性:
保護企業數碼資產:企業的數碼資產包括客戶數據、財務數據、業務機密等重要資訊,這些資產是企業成功的基礎。Cybersecurity可以保護這些數字資產免受未經授權的訪問和使用。
避免財務損失:網絡攻擊和數據泄露可能導致企業的財務損失,包括賠償、補救措施和法律費用等。Cybersecurity可以幫助企業減少這些損失。
保護企業聲譽:安全事件可能對企業聲譽造成嚴重的損害,進而影響企業的商業運營和發展。Cybersecurity可以保護企業聲譽免受損害。
提高客戶信任度:客戶對企業的信任是企業成功的基礎之一。Cybersecurity可以保護客戶數據和隱私,提高客戶對企業的信任度。
Cybersecurity已經成為企業不可或缺的一部分。保護企業的數碼資產和數據不僅是企業的責任,也是保護客戶利益和維護商業道德的必要措施。
因此,企業應該重視Cybersecurity,制定相應的策略和措施,以減少安全風險和保護企業的數碼資產。
What You’ll Learn
Module 1: Introduction to Cybersecurity
- Ethical issue in Cybersecurity
- Cybercrime Landscape and Threats
- Cybersecurity Frameworks and Standards Overview
- Common cyber-attack types
Module 2: Cryptography
- Authentication Protocols and Techniques
- Cryptographic Algorithms and hacking
Module 3: Vulnerability Assessment and Management
- Common Vulnerabilities, types (CVSS scoring)
- Vulnerability Scanning tools
- Vulnerabilities Managements
Module 4: Website Hacking Techniques
- OWASP framework
- Advanced Website Hacking Techniques and Tools
Module 5: Website Protection Strategies
- Website Protection Best Practices and Tools for Cybersecurity Defense
- Web Application Firewall (WAF) and Reverse Proxy for Website Protection
Module 6: Malware and Botnets
- Malware Types, Characteristics, and Prevention Techniques
- Botnets and their Impact on Cybersecurity
- Botnet exercise
- Anti-Malware Tools and Techniques for Cybersecurity Defense
Module 7: Enterprise Infrastructure Protection (I)
- Metasploit Framework and Penetration Testing
- Port Security and Network Access Control for Enterprise Security
- Firewall Technologies and Configurations for Cybersecurity Defense
- DHCP and DNS Spoofing Attacks Prevention Techniques
- Certification Authority and Public Key Infrastructure in Cybersecurity Management
Module 8: Enterprise Infrastructure Protection (II)
- Accounts Authentication and Authorization for Enterprise Security
- Active Directory Security and Group Policy Management Best Practices
- x.509 Certificates and Secure Communication for Cybersecurity Defense
Module 9: Cloud Security
- DDoS Attacks and Mitigation Techniques for Cloud Security
- Identity and Access Management (IAM) for Cloud Cybersecurity
- Cloud-Based WAF and Security Services for Cloud Security Management
Module 10: Operating System Hardening Guides
- Windows Security Hardening Best Practices and Guidelines for Cybersecurity Defense
Note: The course outline is subject to change based on the needs and requirements of the students and the latest updates in the market.