• Courses

    Latest Courses

    • Investigating Cryptocurrency Transactions – Course no. 9
    • Investigating Cryptocurrency Transactions – Course no. 8
    • Investigating Cryptocurrency Transactions – Course no. 7
    • Investigating Cryptocurrency Transactions – Course no. 6
    • Investigating Cryptocurrency Transactions – Course no. 5
    • Investigating Cryptocurrency Transactions – Course no. 4
    • Investigating Cryptocurrency Transactions – Course no. 3
    • Investigating Cryptocurrency Transactions – Course no. 2
    Investigating Cryptocurrency Transactions – Course no. 9

    Investigating Cryptocurrency Transactions – Course no. 9

    Free
    Read More
  • Trainers
  • Events
  • Guidelines
    • Cybersecurity Skills
    • Cybersecurity Guide
    • Cybersecurity Best Practices
    • OSINT for Fake News
  • About us
  • Contact
    CyberLearning
    • Courses

      Latest Courses

      • Investigating Cryptocurrency Transactions – Course no. 9
      • Investigating Cryptocurrency Transactions – Course no. 8
      • Investigating Cryptocurrency Transactions – Course no. 7
      • Investigating Cryptocurrency Transactions – Course no. 6
      • Investigating Cryptocurrency Transactions – Course no. 5
      • Investigating Cryptocurrency Transactions – Course no. 4
      • Investigating Cryptocurrency Transactions – Course no. 3
      • Investigating Cryptocurrency Transactions – Course no. 2
      Investigating Cryptocurrency Transactions – Course no. 9

      Investigating Cryptocurrency Transactions – Course no. 9

      Free
      Read More
    • Trainers
    • Events
    • Guidelines
      • Cybersecurity Skills
      • Cybersecurity Guide
      • Cybersecurity Best Practices
      • OSINT for Fake News
    • About us
    • Contact

      Cybersecurity

      • Home
      • All courses
      • Cybersecurity
      • Latest Threats in Social Networks

      Latest Threats in Social Networks

      Admin bar avatar
      Admin
      Cybersecurity
      Free
      Latest Threats in Social Networks
      • Overview
      • Curriculum
      • Instructor

      ORGANIZER

      Romanian Association for Information Security Assurance (RAISA)

      SUPPORTING AGENCY

      U.S. Embassy in Romania

      DATE AND TIME

      January 26, 2022, 17:00-19:00

      PLACE

      Online (Microsoft Teams platform)

      AIM

      The aim of this training is to present the latest threats in social networks and methods to protect against the latest scams.

      OBJECTIVES

      The participants will gain knowledge about:

      • The evolution of social networks;
      • The main threats from social networks;
      • Methods for protecting against the social media threats.

      TARGET GROUP

      • Law enforcement, judicial staff;
      • Public institutions, private companies;
      • High-schools and university students.

      LEARNING OUTCOMES

      At the end of the training the participant will be able to:

      • Present the evolution of social networks;
      • Describe the threats present in social networks;
      • Identify the scams from social media.

      EDUCATIONAL PARTNERS

      • Romanian National Cyber Security Directorate
      • Romanian National Institute of Magistracy
      • Romanian Banking Institute
      • European Institute of Romania

      TRAINERS

      • Dorin NEDELCU – Romanian Directorate for Cybersecurity
      • Sorin Ioan STĂNICĂ – Romanian Police
      • Iulian COMAN – European Agency for Law Enforcement Training
      • Magda POPESCU – Microsoft Corporation
      • Andrei NIȚU-ECXARCU – Fortinet
      • LIVIU MORON – European Exchanges Development Agency (ADeSE)

      CERTIFICATE OF ATTENDANCE

      The participants will receive a certificate of attendance, issued by the Romanian Association for Information Security Assurance (RAISA).

      REGISTER

      Register here until January 25, 2022, 17:00.

      Course Features

      • Lectures 6
      • Quizzes 0
      • Duration 2 hours
      • Skill level All levels
      • Language Romanian
      • Students 128
      • Assessments Yes
      CoursesCybersecurityLatest Threats in Social Networks
      • Interactive presentations
        3
        • Lecture1.1
          The evolution of social networks
        • Lecture1.2
          The threats present in social networks
        • Lecture1.3
          Solution to combat the scams from social media
      • Post presentations session
        3
        • Lecture2.1
          Study cases
        • Lecture2.2
          Questions & Answers
        • Lecture2.3
          Final conclusions
      Admin bar avatar
      Admin

      The Administrator of cyberlearning.ro website

      • Share:

      You May Like

      Cybersecurity Best Practices
      Admin bar avatar
      Admin

      Cybersecurity Best Practices

      202
      Free

      Latest Courses

      Investigating Cryptocurrency Transactions – Course no. 9

      Investigating Cryptocurrency Transactions – Course no. 9

      Free
      Investigating Cryptocurrency Transactions – Course no. 8

      Investigating Cryptocurrency Transactions – Course no. 8

      Free
      Investigating Cryptocurrency Transactions – Course no. 7

      Investigating Cryptocurrency Transactions – Course no. 7

      Free
      Investigating Cryptocurrency Transactions – Course no. 6

      Investigating Cryptocurrency Transactions – Course no. 6

      Free
      Investigating Cryptocurrency Transactions – Course no. 5

      Investigating Cryptocurrency Transactions – Course no. 5

      Free

      Latest Posts

      Launching the course on online money laundering
      28Jan2022
      Launching the course on analyzing cryptocurrencies
      28Jan2022
      Launching the course on investigating malware attacks
      24Jan2022
      Launching the course on collecting electronic evidence
      24Jan2022
      Launching the course on latest threats in social networks
      12Jan2022

      Contact

      www.raisa.org

      contact[at]raisa[dot]org

      Follow us on

      Latest Courses

      Investigating Cryptocurrency Transactions – Course no. 9 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 9

      Admin bar avatar
      Admin
      15
      students
      Free
      Investigating Cryptocurrency Transactions – Course no. 8 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 8

      Admin bar avatar
      Admin
      15
      students
      Free
      Investigating Cryptocurrency Transactions – Course no. 7 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 7

      Admin bar avatar
      Admin
      17
      students
      Free
      Investigating Cryptocurrency Transactions – Course no. 6 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 6

      Admin bar avatar
      Admin
      15
      students
      Free
      Investigating Cryptocurrency Transactions – Course no. 5 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 5

      Admin bar avatar
      Admin
      14
      students
      Free
      Investigating Cryptocurrency Transactions – Course no. 4 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 4

      Admin bar avatar
      Admin
      25
      students
      Free
      Investigating Cryptocurrency Transactions – Course no. 3 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 3

      Admin bar avatar
      Admin
      26
      students
      Free
      Investigating Cryptocurrency Transactions – Course no. 2 Read More
      Admin bar avatar
      Admin

      Investigating Cryptocurrency Transactions – Course no. 2

      Admin bar avatar
      Admin
      23
      students
      Free

      This website was developed by the Romanian Association for Information Security Assurance (RAISA) with the help of the U.S. Embassy in Romania within the “Enhance Cyber Capacity Building in Romania for Preventing and Combating the Cybercrime Phenomenon” project. The project was funded in part by a grant from the United States Department of State. The opinions, findings, and conclusions stated herein are those of the author[s] and do not necessarily reflect those of the United States Department of State.

      Modal title

      Message modal