Mask-group

Index



The Need for Cybersecurity:

  1. Personal Data

    1. Introduction to personal data

    2. What is Cybersecurity

    3. Your online and offline identity

    4. Your data

    5. Where is your data?

    6. Your computing devices

    7. Personal data as a Target

    8. They want your money

    9. They want your identity

  2. Organizational Data

    1. Types of Organizational data

    2. Confidentiality, Integrity, and Availability

    3. Security Breach example 1

    4. Security breach example 2

  3. Attackers and cybersecurity professionals

    1. Types of attackers

    2. Internal and external threats

  4. Cyberwarfare

    1. What is cyberwarfare?

    2. The purpose of cyberwarfare

  5. Summary