Cybersecurity Fundamentals Course by Wajid Rafique


Lesson 1

Welcome to the cybersecurity fundamentals course. This is the first lesson and the topic of this lesson is Cutting Edge Cybersecurity Challenges in the Age of Artificial Intelligence.

 Learning Resources, Lecture Slides, and Assessment Activity

Lecturer Slides

Thank you for taking the time to visit the lecture page. 

Downloading the Lecture Slides 

 Please feel free to download the lecture slides from the link below.

Learning Resources


Relevant Videos
A short video by IBM on the future of AI and cybersecurity
A short video by NordVPN on cybersecurity challenges and their mitigations

CyberSecurity Definitions


Please explore the following link to read more about cybersecurity

Importance of Cybersecurity
Please use the following link to explore cybersecurity attacks during the past few years.



What is Artificial Intelligence
Please use the following links to explore more about artificial intelligence. 

https://builtin.com/artificial-intelligence

Attacks Mitigation Using AI

Activity: Cybersecurity Attacks and Mitigation Strategies 

 This activity is planned to assess your understanding of the topic "Cutting Edge Cybersecurity Challenges in the Age of Artificial Intelligence".

Assessment Activity Requirements

Activity 1

You are supposed to provide two cybersecurity attacks and how AI would be helpful to mitigate these attacks.

How to Add your Contribution:

Click on the "+" icon in the Padlet window and add your name to the title. Under the title, you can add your contributions. Finally, click on Publish button to publish your contribution. There is already one post from the instructor. Please add a new post mentioning your name and two different attack types.

 

Activity 2
You are required to contribute to the activity by providing any instance that you remember, you were a victim of a cyber attack?

Have you Ever Been a Victim of a Cyber Attack?

Click on the "+" icon in the Padlet window and add your name to the title. Under the title, you can add your contributions. Finally, click on Publish button to publish your contribution. There is already one post from the instructor. Please add a new post mentioning your name and two different attack types.





Made with Padlet




Made with Padlet

Comments

Popular posts from this blog

Guidelines for Effective Academic Writing

Unstructued Notes on TCP IP Networking

Protecting IT Infrastructure: Key Takeaways from the CrowdStrike Update Incident