Linux, web & cybersecurity Consultant / Trainer. Master degree Artificial Intelligent systems. Certified Linux LPI and Red Hat System Administrator (RHCSA).
Founder of IT Company ‘MDFIVE’
1. Introduction
2. Cybersecurity’s terminology
3. The motives of Cyberattacks
a. Types of Hackers
4. Types of Threats
a. Hacking
b. Phishing
c. Spamming
5. Ethical Hacking
a. Methodology
Language: English
Talk