Cyber Security Threats
IT
Seminars and Educational Trips Reflection Report
Jerika C. Soriano
BSIT 4B
Cyber Security Threats
Details
of the Event/Activity:
I recently
took a Cyber Security Threats online course with Great Learning. Throughout the
course, we delved into various types of cyber threats, including phishing
attacks, SQL injection threats, man-in-the-middle attacks, malware, zero-day
attacks, cross-site scripting, advanced persistent threats, password attacks,
drive-by attacks, denial of service attacks, distributed denial of service
attacks, eavesdropping attacks, and AI-powered attacks. Additionally, we
explored the concept of cyber threat intelligence.
Reflections
on the Webinar/Activity and Learnings:
The course
was incredibly insightful. I learned about the different ways cybercriminals
can exploit vulnerabilities in systems and networks to gain unauthorized access
or cause harm. Understanding these threats is crucial for anyone using the
internet, as it helps us recognize suspicious activities and protect ourselves
and our data.
Reflections
on Possibilities for Practical Application of Learning:
The
knowledge gained from this course can be applied in various practical
scenarios. For instance, I can use this knowledge to identify phishing emails
or websites attempting to steal personal information. Additionally,
understanding SQL injection threats can help in securing databases, and
recognizing signs of malware can aid in keeping devices safe from harmful
software.
Suggestions
for Improvements to be Made/Consider for Future Activities:
While the
course content was comprehensive, I believe incorporating more real-life case
studies. This would provide practical examples of cyber threats and how they
are mitigated in different situations.
Positive
Feedback on the Event Organization:
Overall, the
organization of the course was excellent. The topics were well-structured, and
the instructors were knowledgeable and engaging. The course materials were also
easily accessible, which facilitated learning.
Suggestions
for Improvements to be Made/Consider for Future Activities:
One
suggestion for improvement would be to provide more opportunities for simulations.
This would allow participants to apply the concepts learned in a simulated
environment, reinforcing their understanding of cyber threats and how to combat
them effectively.
Photos:
Certificate:
Comments
Post a Comment