Skip to main content

Cyber Security Classes

Cyber Safety

Description and Course Objectives: A introduction / review to Cyber Safety.  Why cyber safety is a growing concern in the modern era.  Understand the various events concerning Cyber Safety that are unique to the modern world.

Course Objectives: In this training, you will:

  • Recognize that you are creating a “Digital Footprint” for yourself that can last forever.
  • Identify ransomware / malware .
  • phishing. etc
  • Recognize the ways in which identity theft occurs, and how to protect yourself from becoming a victim of identity theft
  • Recognize the dangers of being distracted when walking and driving because of your mobile device▪ who are the threats
  • what do the threat actors want (their motives)
  • how to be safe online
  • what would it take to become invisible online

Intro to Artificial Intelligence

Description and Course Objectives: Artificial Intelligence (AI) is the theory and development of computer systems able to perform tasks that normally require human intelligence, such as visual perception, speech recognition, decision-making, and language translations. Most AI examples that you hear about today – from chess-playing computers to self-driving cars – use advanced technologies, such as deep learning and natural language processing, to train computers to accomplish specific tasks by processing large amounts of data and recognizing patterns in the data. AI makes it possible for machines to learn from experience, adjust to new inputs, and perform human-like tasks. In this introductory course, you will become familiar with the basic concepts and definitions of modern AI, some of its applications/uses, implications and impacts, and how AI is re-defining numerous industries.

Course Objectives: In this training, you will:

  • List the basic definitions for key terminologies used in AI.
  • Discuss the practical, philosophical, moral, and societal impacts of AI.
  • Describe the major applications of AI in various fields, such as financial services, healthcare, customer service, etc
  • Explain what Machine Learning is and why it matters.
  • Define Deep Learning and why it matters.
  • Discuss recent innovations in AI and Machine Learning.
  • Describe the general process for developing AI products.
  • Explain the challenges of AI product development

Defending Against Social Engineering Attacks

Description and Course Objectives: The impact of a social engineering attack has reached new heights in the Information Age because of the ability for one person to anonymously reach an enormous audience. However, foundational elements of the components of social engineering have remained constant over time. Those responsible for defending their organizations from social engineering threats must understand not only the “tool bag of tricks” employed by cyber criminals and intelligence agents to exploit trust, but also an understanding of the black-market sale of information that drives cyber criminal economic decisions and targets. By understanding both how social engineering works, and what incentives drive cyber criminal behavior, defenders can proactively address training opportunities across their organizations.

Defending Against Social Engineering Attacks is a two-day instructor-led online course that covers how social engineering works, what incentives drive cyber criminal behavior, and how defenders can proactively address training opportunities across their organizations ahead of expected cyber criminal activity

Cyber Warfare For Practitioners

Description and Course Objectives: Cyber warfare involves the actions by a nation-state or international organization to attack and attempt to damage another nation’s computers or information networks through, for example, computer viruses or denial-of-service attacks. CCG research provides recommendations to military and civilian decision makers on methods of defending against the damaging effects of cyber warfare on a nation’s digital infrastructure.

Living in an information society opens unprecedented opportunities for hostile rivals to cause disruption, delay, inefficiency, and harm. Social manipulation techniques are evolving beyond disinformation and cyber attacks on infrastructure sites. How can democracies protect themselves?

Course Objectives:
In this training, you will learn:

  • The battlefields, actors, technologies & tactics for electronic warfare.
  • The ethics and consequences of cyber warfare.
  • How to identify & defend a network against malicious attacks.
  • Hacktivism, espionage & insider threats.

Cyber Warfare for Practitioners.

Offense and Defensive perspective.

Cyber warfare involves the actions by a nation-state or international organization to attack and attempt to damage another nation’s computers or information networks through, for example, computer viruses or denial-of-service attacks. CCG research provides recommendations to military and civilian decision makers on methods of defending against the damaging effects of cyber warfare on a nation’s digital infrastructure.

Living in an information society opens unprecedented opportunities for hostile rivals to cause disruption, delay, inefficiency, and harm. Social manipulation techniques are evolving beyond disinformation and cyberattacks on infrastructure sites. How can democracies protect themselves?

Presenting architecture and design of systems for security as a primary focus.

Discussion includes the ways and means of proper architecture to ensure the strongest protection of your systems.  Standards and design recommendation to harden systems.  This will cover Network layouts, system protections and applications.  How to provide the best layouts to protect your entire environment.

Machine Learning vs Humanoid Artificial Intelligence (Strong AI)

Description and Course Objectives:

Focused on Humanoid AI as a superset of ML and advantages provided beyond ML.  Present ML and it’s successful uses in problem-solving.  ML capabilities and limitations.  Presenting cutting edge uses of Humanoid AI.  How it provides additional AI capabilities and dynamic problem solving beyond ML and/or scripted programmatic solutions.

Explaining what you should expect from your Cyber AI solutions and where the AI movement is going.  AI that is pushing the limits of computers to behave and respond like a human.

Reference to include detailed analysis of ML and Humanoid AI in cybersecurity with advantages and added advantages of emerging AI technologies.

Strong AI is a term used to describe a certain mindset of artificial intelligence development. Strong AI’s goal is to develop artificial intelligence to the point where the machine’s intellectual capability is functionally equal to a human’s.