-
Interactive presentations
5-
The evolution of cyber-threatsLecture1.1
-
Malware classificationLecture1.2
-
Web and email-based attacks, social media scamsLecture1.3
-
Online and offline attack vectorsLecture1.4
-
Cybersecurity solutionsLecture1.5
-
-
Post presentations session
3-
Study casesLecture2.1
-
Questions & AnswersLecture2.2
-
Final conclusionsLecture2.3
-
Online and offline attack vectors
Lesson content is empty.
