• Courses

    Latest Courses

    • Investigating Cryptocurrency Transactions – Course no. 9
    • Investigating Cryptocurrency Transactions – Course no. 8
    • Investigating Cryptocurrency Transactions – Course no. 7
    • Investigating Cryptocurrency Transactions – Course no. 6
    • Investigating Cryptocurrency Transactions – Course no. 5
    • Investigating Cryptocurrency Transactions – Course no. 4
    • Investigating Cryptocurrency Transactions – Course no. 3
    • Investigating Cryptocurrency Transactions – Course no. 2
    Investigating Cryptocurrency Transactions – Course no. 9

    Investigating Cryptocurrency Transactions – Course no. 9

    Free
    Read More
  • Trainers
  • Events
  • Guidelines
    • Cybersecurity Skills
    • Cybersecurity Guide
    • Cybersecurity Best Practices
    • OSINT for Fake News
  • About us
  • Contact
    CyberLearning
    • Courses

      Latest Courses

      • Investigating Cryptocurrency Transactions – Course no. 9
      • Investigating Cryptocurrency Transactions – Course no. 8
      • Investigating Cryptocurrency Transactions – Course no. 7
      • Investigating Cryptocurrency Transactions – Course no. 6
      • Investigating Cryptocurrency Transactions – Course no. 5
      • Investigating Cryptocurrency Transactions – Course no. 4
      • Investigating Cryptocurrency Transactions – Course no. 3
      • Investigating Cryptocurrency Transactions – Course no. 2
      Investigating Cryptocurrency Transactions – Course no. 9

      Investigating Cryptocurrency Transactions – Course no. 9

      Free
      Read More
    • Trainers
    • Events
    • Guidelines
      • Cybersecurity Skills
      • Cybersecurity Guide
      • Cybersecurity Best Practices
      • OSINT for Fake News
    • About us
    • Contact

      Cybercrime

      • Home
      • All courses
      • Cybercrime
      • Analyzing Cyber-Threats and Attack Vectors

      Analyzing Cyber-Threats and Attack Vectors

      Admin bar avatar
      Admin
      Cybercrime
      Free
      Analyzing Cyber-Threats and Attack Vectors
      • Overview
      • Curriculum
      • Instructor

      ORGANIZER

      Romanian Association for Information Security Assurance (RAISA)

      SUPPORTING AGENCY

      U.S. Embassy in Romania

      DATE AND TIME

      December 09, 2021, 17:00-19:00

      PLACE

      Online (Microsoft Teams platform)

      AIM

      The aim of this training is to bring awareness on the new cyber-threats and to analyze the attacks vectors.

      OBJECTIVES

      The participants will gain knowledge about:

      • The newest types of malware;
      • Web and email-based attacks and social media scams;
      • Online and offline attack vectors;
      • Cybersecurity solutions.

      TARGET GROUP

      • Law enforcement, judicial staff.
      • Private companies, IT experts.
      • Professors, students.

      LEARNING OUTCOMES

      At the end of the training the participant will be able to:

      • Present the new types of cyber-threats;
      • Explain the main types of malware;
      • Describe the web and email-based attacks;
      • Present the online and offline attack vectors.

      EDUCATIONAL PARTNERS

      • Romanian National Directorate for Cybersecurity (DNSC)
      • Romanian National Institute of Magistracy

      TRAINERS

      • Megan BISHOP – U.S. Embassy in Romania
      • Dan CÎMPEAN – Romanian Directorate for Cybersecurity
      • Cătălina PISARGIAC – National Cyberint Center
      • Costel CIUCHI – General Secretariat of the Government
      • Bogdan TOPORAN – Best Internet Security (BISS)
      • Mircea-Constantin ȘCHEAU – University of Craiova
      • Ioan-Cosmin MIHAI – “Al. I. Cuza” Police Academy

      CERTIFICATE OF ATTENDANCE

      The participants will receive a certificate of attendance, issued by the Romanian Association for Information Security Assurance (RAISA).

      REGISTER

      Register here until December 08, 2021, 16:00.

      Course Features

      • Lectures 8
      • Quizzes 0
      • Duration 2 hours
      • Skill level All levels
      • Language English
      • Students 119
      • Assessments Yes
      CoursesCybercrimeAnalyzing Cyber-Threats and Attack Vectors
      • Interactive presentations
        5
        • Lecture1.1
          The evolution of cyber-threats
        • Lecture1.2
          Malware classification
        • Lecture1.3
          Web and email-based attacks, social media scams
        • Lecture1.4
          Online and offline attack vectors
        • Lecture1.5
          Cybersecurity solutions
      • Post presentations session
        3
        • Lecture2.1
          Study cases
        • Lecture2.2
          Questions & Answers
        • Lecture2.3
          Final conclusions
      Admin bar avatar
      Admin

      The Administrator of cyberlearning.ro website

      • Share:

      You May Like

      Investigating Cryptocurrency Transactions – Course no. 9
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions - Course no. 9

      15
      Free
      Investigating Cryptocurrency Transactions – Course no. 8
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions - Course no. 8

      15
      Free
      Investigating Cryptocurrency Transactions – Course no. 7
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions - Course no. 7

      17
      Free
      Investigating Cryptocurrency Transactions – Course no. 6
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions - Course no. 6

      15
      Free
      Investigating Cryptocurrency Transactions – Course no. 5
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions - Course no. 5

      14
      Free

      Latest Courses

      Investigating Cryptocurrency Transactions – Course no. 9

      Investigating Cryptocurrency Transactions – Course no. 9

      Free
      Investigating Cryptocurrency Transactions – Course no. 8

      Investigating Cryptocurrency Transactions – Course no. 8

      Free
      Investigating Cryptocurrency Transactions – Course no. 7

      Investigating Cryptocurrency Transactions – Course no. 7

      Free
      Investigating Cryptocurrency Transactions – Course no. 6

      Investigating Cryptocurrency Transactions – Course no. 6

      Free
      Investigating Cryptocurrency Transactions – Course no. 5

      Investigating Cryptocurrency Transactions – Course no. 5

      Free

      Latest Posts

      Launching the course on online money laundering
      28Jan2022
      Launching the course on analyzing cryptocurrencies
      28Jan2022
      Launching the course on investigating malware attacks
      24Jan2022
      Launching the course on collecting electronic evidence
      24Jan2022
      Launching the course on latest threats in social networks
      12Jan2022

      Contact

      www.raisa.org

      contact[at]raisa[dot]org

      Follow us on

      Latest Courses

      Investigating Cryptocurrency Transactions – Course no. 9 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 9

      Admin bar avatar
      Admin
      15
      students
      Free
      Investigating Cryptocurrency Transactions – Course no. 8 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 8

      Admin bar avatar
      Admin
      15
      students
      Free
      Investigating Cryptocurrency Transactions – Course no. 7 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 7

      Admin bar avatar
      Admin
      17
      students
      Free
      Investigating Cryptocurrency Transactions – Course no. 6 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 6

      Admin bar avatar
      Admin
      15
      students
      Free
      Investigating Cryptocurrency Transactions – Course no. 5 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 5

      Admin bar avatar
      Admin
      14
      students
      Free
      Investigating Cryptocurrency Transactions – Course no. 4 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 4

      Admin bar avatar
      Admin
      25
      students
      Free
      Investigating Cryptocurrency Transactions – Course no. 3 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 3

      Admin bar avatar
      Admin
      26
      students
      Free
      Investigating Cryptocurrency Transactions – Course no. 2 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 2

      Admin bar avatar
      Admin
      23
      students
      Free

      This website was developed by the Romanian Association for Information Security Assurance (RAISA) with the help of the U.S. Embassy in Romania within the “Enhance Cyber Capacity Building in Romania for Preventing and Combating the Cybercrime Phenomenon” project. The project was funded in part by a grant from the United States Department of State. The opinions, findings, and conclusions stated herein are those of the author[s] and do not necessarily reflect those of the United States Department of State.

      Modal title

      Message modal