Course Content
Cyber Threats and Vulnerabilities
Addresses intrusion detection and response systems and measures to build a secure infrastructure for assessing, monitoring, and preventing. The main aim of this lab is to equip the TG with the skills and knowledge to detect and respond to cyber security breaches by taking into account some of the following topics: Novel sources and types of cyber-attacks in Industry 4.0, Attack techniques tools, Vulnerability scanning tools, Anti-malware, anti-virus and firewall software, Threat modeling, Security attack pathologies, Prevention of Data Leak, and Securing the Supply Chain.
0/1
To detect and respond to cyber security breaches
No Attachment Found
No Attachment Found