Share

Live Webinar – October 21st 2014, 1:00 pm – 2:00 pm EDT
Offered by: Global Knowledge UK  (REP 1999)
Duration: 1 hour 1 PDU / 1 CDU Credits: 1 PDU Category C – Free PDU

Note: Although Global Knowledge is an REP this opportunity may not have a course number and may need to be recorded as a Category C PDU. Contact Global Knowledge for further information.

The bad guys just keep getting better!

No matter how much patching and tweaking we do, the bad guys’ constantly changing tactics and techniques continue harming our networks, stealing and damaging data, and just generally screw things up.

  • What motivates someone to do such terrible things in the first place?
  • How have these hackers changed and improved?
  • What kinds of attacks are popular now and why?

In this hour-long webinar, security expert, former hacker and Global Knowledge instructor Phillip D. Shade will provide insight into understanding the latest hacking techniques, what the current threat landscape looks like, and suggested countermeasures to mitigate threats.

Phillip will include specific examples of the current threat landscape, including data mining, social engineering cyber threat terminology, man-in-the- middle attacks and Denial of Service (DoS) attacks.

Outline

  • What is a Hacker? An Introduction to the Dark Side of the Internet
  • Meet the Hacker’s Best Friend: You! (Social Engineering 101)
  • Current Threat Landscape: What’s Old is New Again and the Return of the Old Favorites
  • Man-in-the-Middle
  • Phishing
  • Drive-by Downloads
  • Cyber Survival 101: Forget Preventing Attacks. Learn How to Best Defend Against and Repair Things Once the Damage Has Been Done

Presenter:  Phillip D. Shade, CNX-E, CWNA, PASTech, WNAX-Forensics, (eForensicsMagazine bio, LinkedIn profile) is the founder of Merlion’s Keep Consulting, a company specializing in network and forensics analysis. An internationally recognized network security and forensics expert with more than 30 years of experience, Phillip is a member of FBI InfraGard, Computer Security Institute and the IEEE, and he is a volunteer at the Cyber Warfare Forum Initiative.

PDU Category C (PMBOK 5) documentation details:
Process Groups: Executing
Knowledge Areas: 8 – Quality 11 – Risk

  • 5.2 Collect Requirements
  • 5.3 Define Scope
  • 8.1 Plan Quality
  • 11.2 Identify Risks
  • 11.5 Plan Risk Responses

As a Category C “Self Directed Learning Activity” remember to document your learning experience and its relationship to project management for your “PDU Audit Trail Folder”

Click to register for What You Don’t Know About Cybersecurity CAN Hurt You