Cybersecurity Fundamentals Course by Wajid Rafique
Lesson 1
Welcome to the cybersecurity fundamentals course. This is the first lesson and the topic of this lesson is Cutting Edge Cybersecurity Challenges in the Age of Artificial Intelligence.
Learning Resources, Lecture Slides, and Assessment Activity
Lecturer Slides
Thank you for taking the time to visit the lecture page.Downloading the Lecture Slides
Please feel free to download the lecture slides from the link below.
Learning Resources
Relevant Videos
A short video by IBM on the future of AI and cybersecurity
A short video by NordVPN on cybersecurity challenges and their mitigations
CyberSecurity Definitions
Please explore the following link to read more about cybersecurity
Importance of Cybersecurity
Please use the following link to explore cybersecurity attacks during the past few years.
What is Artificial Intelligence
Please use the following links to explore more about artificial intelligence.
https://builtin.com/artificial-intelligence
Attacks Mitigation Using AI
Activity: Cybersecurity Attacks and Mitigation Strategies
This activity is planned to assess your understanding of the topic "Cutting Edge Cybersecurity Challenges in the Age of Artificial Intelligence".
Assessment Activity Requirements
Activity 1
You are supposed to provide two cybersecurity attacks and how AI would be helpful to mitigate these attacks.
How to Add your Contribution:
Click on the "+" icon in the Padlet window and add your name to the title. Under the title, you can add your contributions. Finally, click on Publish button to publish your contribution. There is already one post from the instructor. Please add a new post mentioning your name and two different attack types.
Activity 2
You are required to contribute to the activity by providing any instance that you remember, you were a victim of a cyber attack?
Have you Ever Been a Victim of a Cyber Attack?
Click on the "+" icon in the Padlet window and add your name to the title. Under the title, you can add your contributions. Finally, click on Publish button to publish your contribution. There is already one post from the instructor. Please add a new post mentioning your name and two different attack types.
Comments
Post a Comment