Learning from major cyber security incidents

As a society, we are now almost always connected to the internet and rely on it for many different day-to-day activities. However, this dependency on the internet can make us vulnerable to attacks. Once a connected device is compromised, it is not only that particular device that is affected – it can also be used as a springboard to attack other devices in the same network and in others. In this connected world, it is also inevitable that personal information is stored in large-scale government and commercial databases.

Course syllabus:

  1. Cyber security basics

  2. WannaCry

  3. The Talk Talk hack

  4. The Mirai Botner

  5. Attacking infrastructure

  6. Conclusion