Cyber Security Threats

 

IT Seminars and Educational Trips Reflection Report

 

Jerika C. Soriano

BSIT 4B

 

Cyber Security Threats

Details of the Event/Activity:

I recently took a Cyber Security Threats online course with Great Learning. Throughout the course, we delved into various types of cyber threats, including phishing attacks, SQL injection threats, man-in-the-middle attacks, malware, zero-day attacks, cross-site scripting, advanced persistent threats, password attacks, drive-by attacks, denial of service attacks, distributed denial of service attacks, eavesdropping attacks, and AI-powered attacks. Additionally, we explored the concept of cyber threat intelligence.

 

Reflections on the Webinar/Activity and Learnings:

The course was incredibly insightful. I learned about the different ways cybercriminals can exploit vulnerabilities in systems and networks to gain unauthorized access or cause harm. Understanding these threats is crucial for anyone using the internet, as it helps us recognize suspicious activities and protect ourselves and our data.

 

Reflections on Possibilities for Practical Application of Learning:

The knowledge gained from this course can be applied in various practical scenarios. For instance, I can use this knowledge to identify phishing emails or websites attempting to steal personal information. Additionally, understanding SQL injection threats can help in securing databases, and recognizing signs of malware can aid in keeping devices safe from harmful software.

 

Suggestions for Improvements to be Made/Consider for Future Activities:

While the course content was comprehensive, I believe incorporating more real-life case studies. This would provide practical examples of cyber threats and how they are mitigated in different situations.

 

Positive Feedback on the Event Organization:

Overall, the organization of the course was excellent. The topics were well-structured, and the instructors were knowledgeable and engaging. The course materials were also easily accessible, which facilitated learning.

 

Suggestions for Improvements to be Made/Consider for Future Activities:

One suggestion for improvement would be to provide more opportunities for simulations. This would allow participants to apply the concepts learned in a simulated environment, reinforcing their understanding of cyber threats and how to combat them effectively.

 

Photos:








Certificate:


 

Comments

Popular posts from this blog

Experiences and Lessons Learned in Work Environment