
Category:
Threats management |
Level:
Beginner
No. of hours:
1
Learning Objectives (By the end of this Learning Unit you will be able to...)
- Come up with their own way of doing risk assessment
- Understand the concepts of Threats and Risks
- Apply a threat modelling and risk assessment framework for personal and organizational security
Topics Covered:
- Risks vs threats
- Threat modelling and risk assessment

Category:
Threats management
Level:
Beginner
No. of hours:
1
Learning Objectives (By the end of this Learning Unit you will be able to...)
- Define criteria of website security
- List website protection mechanisms
Topics Covered:
- Website security
- Domain management
- eQ tools (Deflect, eQPress, Baskerville)

Category:
Threats management
Level:
Intermediate
No. of hours:
1
Learning Objectives (By the end of this Learning Unit you will be able to...)
- Identify the Zero Trust principles
- Explain the basics of network architecture
- Explain the concepts of secure remote access
Topics Covered:
- Zero Trust architecture principles
- Network segmentation & micro-segmentation
- Secure remote access (VPNs, Zero Trust Network Access)

Category:
Threats management
Level:
Intermediate
No. of hours:
2
Learning Objectives (By the end of this Learning Unit you will be able to...)
- Understand AI Risks and Threats
- Understand best practices for AI Security
Topics Covered:
- Risks and Threats
- Data Privacy and Security
- AI-Powered Cyberattacks
- Adversarial Attacks and Data Poisoning
- Bias and Fairness
- Best Practices for AI Security
- AI Model Security
- Access Control and Authentication
- Continuous Monitoring and Incident Response
- Employee Training and Awareness
- Regulatory Compliance and Ethical Considerations
- AI Governance
- Ethical AI Use
- Compliance with AI Regulations
- Teacher: Oleksandra Marchenko

Category:
Threats management
Level:
Intermediate
No. of hours:
1
Learning Objectives (By the end of this Learning Unit you will be able to...)
- Name government surveillance techniques
- List corporate surveillance techniques
Topics Covered:
- Internet traffic monitoring, phone call & message interception facial recognition & biometric tracking, social media & online activity tracking.
- Tracking cookies, fingerprinting, and behavioural profiling; location tracking via apps and GPS services; smart home devices; cloud storage scanning.