• Courses

    Latest Courses

    • Investigating Cryptocurrency Transactions – Course no. 9
    • Investigating Cryptocurrency Transactions – Course no. 8
    • Investigating Cryptocurrency Transactions – Course no. 7
    • Investigating Cryptocurrency Transactions – Course no. 6
    • Investigating Cryptocurrency Transactions – Course no. 5
    • Investigating Cryptocurrency Transactions – Course no. 4
    • Investigating Cryptocurrency Transactions – Course no. 3
    • Investigating Cryptocurrency Transactions – Course no. 2
    Investigating Cryptocurrency Transactions – Course no. 9

    Investigating Cryptocurrency Transactions – Course no. 9

    Free
    Read More
  • Trainers
  • Events
  • Guidelines
    • Cybersecurity Skills
    • Cybersecurity Guide
    • Cybersecurity Best Practices
    • OSINT for Fake News
  • About us
  • Contact
    CyberLearning
    • Courses

      Latest Courses

      • Investigating Cryptocurrency Transactions – Course no. 9
      • Investigating Cryptocurrency Transactions – Course no. 8
      • Investigating Cryptocurrency Transactions – Course no. 7
      • Investigating Cryptocurrency Transactions – Course no. 6
      • Investigating Cryptocurrency Transactions – Course no. 5
      • Investigating Cryptocurrency Transactions – Course no. 4
      • Investigating Cryptocurrency Transactions – Course no. 3
      • Investigating Cryptocurrency Transactions – Course no. 2
      Investigating Cryptocurrency Transactions – Course no. 9

      Investigating Cryptocurrency Transactions – Course no. 9

      Free
      Read More
    • Trainers
    • Events
    • Guidelines
      • Cybersecurity Skills
      • Cybersecurity Guide
      • Cybersecurity Best Practices
      • OSINT for Fake News
    • About us
    • Contact

      Cybersecurity

      • Home
      • All courses
      • Cybersecurity
      • Cybersecurity solutions – How to protect IT devices and computer networks

      Cybersecurity solutions – How to protect IT devices and computer networks

      Admin bar avatar
      Admin
      Cybersecurity
      Free
      Cybersecurity
      • Overview
      • Curriculum
      • Instructor

      ORGANIZER

      Romanian Association for Information Security Assurance (RAISA)

      SUPPORTING AGENCY

      U.S. Embassy in Romania

      DATE AND TIME

      February 25, 2021, 17:00-20:00

      PLACE

      Online (Microsoft Teams platform)

      AIM

      The aim of this training is to improve the cybersecurity skills of non-IT professionals.

      OBJECTIVES

      The participants will gain knowledge about:

      • The latest cyber threats;
      • Cybersecurity principles;
      • Methods for protecting IT devices and computer networks;
      • Cybersecurity tools and solutions.

      TARGET GROUP

      Non-IT professionals

      LEARNING OUTCOMES

      At the end of the training the participant will be able to:

      • Present the main forms of cyber-threats;
      • Use cybersecurity tools and applications;
      • Secure IT devices and computer networks.

      EDUCATIONAL PARTNER

      Romanian National Computer Security Incident Response Team (CERT-RO)

      TRAINERS

      • Cosmina MOGHIOR – CERT-RO
      • Costel CIUCHI – General Secretariat of the Government
      • Mădălin VASILE – FORTINET
      • Bogdan TOPORAN – Best Internet Security (BISS)
      • Ioan-Cosmin MIHAI – “Al. I. Cuza” Police Academy

      CERTIFICATE OF ATTENDANCE

      The participants will receive a certificate of attendance, issued by the Romanian Association for Information Security Assurance (RAISA).

      REGISTER

      Register here until February 24, 2021, 19:00.

      Course Features

      • Lectures 7
      • Quizzes 0
      • Duration 3,5 hours
      • Skill level All levels
      • Language Romanian
      • Students 119
      • Assessments Yes
      CoursesCybersecurityCybersecurity solutions – How to protect IT devices and computer networks
      • Interactive presentations
        4
        • Lecture1.1
          Cybersecurity challenges and opportunities
        • Lecture1.2
          Methods for securing computers, mobile devices and networks
        • Lecture1.3
          Cybersecurity tools and applications
        • Lecture1.4
          Best practices for cybersecurity
      • Post presentations session
        3
        • Lecture2.1
          Study cases
        • Lecture2.2
          Questions & Answers
        • Lecture2.3
          Final conclusions
      Admin bar avatar
      Admin

      The Administrator of cyberlearning.ro website

      • Share:

      You May Like

      Cybersecurity Best Practices
      Admin bar avatar
      Admin

      Cybersecurity Best Practices

      202
      Free
      Cybersecurity awareness for children and parents
      Admin bar avatar
      Admin

      Cybersecurity awareness for children and parents

      168
      Free
      The importance of teaching cybersecurity to the next generation
      Admin bar avatar
      Admin

      The importance of teaching cybersecurity to the next generation

      89
      Free

      Latest Courses

      Investigating Cryptocurrency Transactions – Course no. 9

      Investigating Cryptocurrency Transactions – Course no. 9

      Free
      Investigating Cryptocurrency Transactions – Course no. 8

      Investigating Cryptocurrency Transactions – Course no. 8

      Free
      Investigating Cryptocurrency Transactions – Course no. 7

      Investigating Cryptocurrency Transactions – Course no. 7

      Free
      Investigating Cryptocurrency Transactions – Course no. 6

      Investigating Cryptocurrency Transactions – Course no. 6

      Free
      Investigating Cryptocurrency Transactions – Course no. 5

      Investigating Cryptocurrency Transactions – Course no. 5

      Free

      Latest Posts

      Launching the course on online money laundering
      28Jan2022
      Launching the course on analyzing cryptocurrencies
      28Jan2022
      Launching the course on investigating malware attacks
      24Jan2022
      Launching the course on collecting electronic evidence
      24Jan2022
      Launching the course on latest threats in social networks
      12Jan2022

      Contact

      www.raisa.org

      contact[at]raisa[dot]org

      Follow us on

      Latest Courses

      Investigating Cryptocurrency Transactions – Course no. 9 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 9

      Admin bar avatar
      Admin
      15
      students
      Free
      Investigating Cryptocurrency Transactions – Course no. 8 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 8

      Admin bar avatar
      Admin
      15
      students
      Free
      Investigating Cryptocurrency Transactions – Course no. 7 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 7

      Admin bar avatar
      Admin
      17
      students
      Free
      Investigating Cryptocurrency Transactions – Course no. 6 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 6

      Admin bar avatar
      Admin
      15
      students
      Free
      Investigating Cryptocurrency Transactions – Course no. 5 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 5

      Admin bar avatar
      Admin
      14
      students
      Free
      Investigating Cryptocurrency Transactions – Course no. 4 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 4

      Admin bar avatar
      Admin
      25
      students
      Free
      Investigating Cryptocurrency Transactions – Course no. 3 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 3

      Admin bar avatar
      Admin
      26
      students
      Free
      Investigating Cryptocurrency Transactions – Course no. 2 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 2

      Admin bar avatar
      Admin
      23
      students
      Free

      This website was developed by the Romanian Association for Information Security Assurance (RAISA) with the help of the U.S. Embassy in Romania within the “Enhance Cyber Capacity Building in Romania for Preventing and Combating the Cybercrime Phenomenon” project. The project was funded in part by a grant from the United States Department of State. The opinions, findings, and conclusions stated herein are those of the author[s] and do not necessarily reflect those of the United States Department of State.

      Modal title

      Message modal