• Courses

    Latest Courses

    • Money Laundering in the Online Environment
    • Methods to Combat Cyber Threats Targeting Financial Institutions
    • Cybersecurity Threats. Identification and Prevention
    • Blockchain and Virtual Currencies
    • Investigating Cryptocurrency Transactions – Course no. 9
    • Investigating Cryptocurrency Transactions – Course no. 8
    • Investigating Cryptocurrency Transactions – Course no. 7
    • Investigating Cryptocurrency Transactions – Course no. 6
    • Investigating Cryptocurrency Transactions – Course no. 5
    • Investigating Cryptocurrency Transactions – Course no. 4
    • Investigating Cryptocurrency Transactions – Course no. 3
    • Investigating Cryptocurrency Transactions – Course no. 2
    Money Laundering in the Online Environment

    Money Laundering in the Online Environment

    1,000 lei
    Read More
  • Trainers
  • Events
  • Guidelines
    • Cybersecurity Skills
    • Cybersecurity Guide
    • Cybersecurity Best Practices
    • OSINT for Fake News
  • About us
  • Contact
    CyberLearning Academy
    • Courses

      Latest Courses

      • Money Laundering in the Online Environment
      • Methods to Combat Cyber Threats Targeting Financial Institutions
      • Cybersecurity Threats. Identification and Prevention
      • Blockchain and Virtual Currencies
      • Investigating Cryptocurrency Transactions – Course no. 9
      • Investigating Cryptocurrency Transactions – Course no. 8
      • Investigating Cryptocurrency Transactions – Course no. 7
      • Investigating Cryptocurrency Transactions – Course no. 6
      • Investigating Cryptocurrency Transactions – Course no. 5
      • Investigating Cryptocurrency Transactions – Course no. 4
      • Investigating Cryptocurrency Transactions – Course no. 3
      • Investigating Cryptocurrency Transactions – Course no. 2
      Money Laundering in the Online Environment

      Money Laundering in the Online Environment

      1,000 lei
      Read More
    • Trainers
    • Events
    • Guidelines
      • Cybersecurity Skills
      • Cybersecurity Guide
      • Cybersecurity Best Practices
      • OSINT for Fake News
    • About us
    • Contact

      Cybersecurity

      • Home
      • All courses
      • Cybersecurity
      • Cybersecurity Threats. Identification and Prevention
      CoursesCybersecurityCybersecurity Threats. Identification and Prevention
      • Interactive presentations
        7
        • Lecture1.1
          Evolution of the main forms of malware. Analysis of online and offline attack vectors
        • Lecture1.2
          Identifying cyber attacks targeting email accounts
        • Lecture1.3
          Methods for analyzing suspicious emails. Analysis of attachments
        • Lecture1.4
          Identifying fake news with cybersecurity risks. Searching and analyzing information from open sources on the internet
        • Lecture1.5
          Identifying risks on social media. Prevention methods
        • Lecture1.6
          Solutions for securing data and IT systems
        • Lecture1.7
          New perspectives in cybersecurity
      • Post presentations session
        3
        • Lecture2.1
          Study cases
        • Lecture2.2
          Questions & Answers
        • Lecture2.3
          Final conclusions
        This content is protected, please login and enroll course to view this content!
        Prev Methods for analyzing suspicious emails. Analysis of attachments
        Next Identifying risks on social media. Prevention methods

        Latest Courses

        Money Laundering in the Online Environment

        Money Laundering in the Online Environment

        1,000 lei
        Methods to Combat Cyber Threats Targeting Financial Institutions

        Methods to Combat Cyber Threats Targeting Financial Institutions

        1,000 lei
        Cybersecurity Threats. Identification and Prevention

        Cybersecurity Threats. Identification and Prevention

        450 lei
        Blockchain and Virtual Currencies

        Blockchain and Virtual Currencies

        1,000 lei
        Investigating Cryptocurrency Transactions – Course no. 9

        Investigating Cryptocurrency Transactions – Course no. 9

        Free

        Latest Posts

        Launching the course on online money laundering
        28Jan2022
        Launching the course on analyzing cryptocurrencies
        28Jan2022
        Launching the course on investigating malware attacks
        24Jan2022
        Launching the course on collecting electronic evidence
        24Jan2022
        Launching the course on latest threats in social networks
        12Jan2022

        Contact

        contact@raisa.org

        Latest Courses

        Money Laundering in the Online Environment Read More
        Admin bar avatar
        Ionuț STOICA

        Money Laundering in the Online Environment

        Admin bar avatar
        Ionuț STOICA
        28
        students
        1,000 lei
        Methods to Combat Cyber Threats Targeting Financial Institutions Read More
        Admin bar avatar
        Ioan-Cosmin MIHAI

        Methods to Combat Cyber Threats Targeting Financial Institutions

        Admin bar avatar
        Ioan-Cosmin MIHAI
        15
        students
        1,000 lei
        Cybersecurity Threats. Identification and Prevention Read More
        Admin bar avatar
        Ioan-Cosmin MIHAI

        Cybersecurity Threats. Identification and Prevention

        Admin bar avatar
        Ioan-Cosmin MIHAI
        15
        students
        450 lei
        Blockchain and Virtual Currencies Read More
        Admin bar avatar
        Ionuț STOICA

        Blockchain and Virtual Currencies

        Admin bar avatar
        Ionuț STOICA
        24
        students
        1,000 lei
        Investigating Cryptocurrency Transactions – Course no. 9 Read More
        Admin bar avatar
        Admin

        Investigating Cryptocurrency Transactions – Course no. 9

        Admin bar avatar
        Admin
        15
        students
        Free
        Investigating Cryptocurrency Transactions – Course no. 8 Read More
        Admin bar avatar
        Admin

        Investigating Cryptocurrency Transactions – Course no. 8

        Admin bar avatar
        Admin
        15
        students
        Free
        Investigating Cryptocurrency Transactions – Course no. 7 Read More
        Admin bar avatar
        Admin

        Investigating Cryptocurrency Transactions – Course no. 7

        Admin bar avatar
        Admin
        17
        students
        Free
        Investigating Cryptocurrency Transactions – Course no. 6 Read More
        Admin bar avatar
        Admin

        Investigating Cryptocurrency Transactions – Course no. 6

        Admin bar avatar
        Admin
        15
        students
        Free

        The CyberLearning Academy was developed by the Romanian Association for Information Security Assurance (RAISA) with the help of the U.S. Embassy in Romania within the “Enhance Cyber Capacity Building in Romania for Preventing and Combating the Cybercrime Phenomenon” project.
        The project was funded in part by a grant from the United States Department of State. The opinions, findings, and conclusions stated herein are those of the author[s] and do not necessarily reflect those of the United States Department of State.

        Modal title

        Message modal