Home
(current)
Learning Material
Introduction to Cybersecurity
Background - Challenges of the 4th Industrial Revolution
History of Cybersecurity
Definitions of Cybersecurity
Cybersecurity within the EU
Fostering Cybersecurity within the European Union
Legal Aspects of Cybersecurity
Overview on the tendencies of Cybersecurity landscape
Cyber-Attacks: Social Engineering and Phishing
Introduction to Cyber-attacks
Social Engineering Modules and Manipulation
Different Types of Phishing Attacks and Techniques
Case Studies
Understanding and Handling Cyber-attacks
Basic Knowledge on e-security
Proactive actions
Recognising Phishing Attacks
Handling Cyber-attacks
Minimising Damage through Incident Response
Simulations
Ranks
Self Evaluation
Simulations
Sign In
Sign Up
Language
Toggle Dropdown
English
Lietuvių
Eesti
Latviski
Ελληνικά
Simulations
Introduction to Cybersecurity
Background - Challenges of the 4th Industrial Revolution
History of Cybersecurity
Definitions of Cybersecurity
Cybersecurity within the EU
Fostering Cybersecurity within the European Union
Legal Aspects of Cybersecurity
Overview on the tendencies of Cybersecurity landscape
Cyber-Attacks: Social Engineering and Phishing
Introduction to Cyber-attacks
Social Engineering Modules and Manipulation
Different Types of Phishing Attacks and Techniques
Case Studies
Understanding and Handling Cyber-attacks
Basic Knowledge on e-security
Proactive actions
Recognising Phishing Attacks
Handling Cyber-attacks
Minimising Damage through Incident Response
Proactive actions
Download slides