Skip to main content
Cybercrimes and its Countermeasures
Paris
Register Now




Contents

Cybercrime, Cybercriminals, and Classifications of Cybercrimes • Cybercrime Fundamentals • Cybercrime Law • Iterative Approach Methodology for Cybercrimes

• The Psychology, Mindset, And Skills of Hackers and Cybercriminals

• Tools & Methods Used in Cybercrimes

• Personal Data Breach

• Phishing / Vishing / Smishing / Pharming

• Identity Theft

• Credit Card Fraud

• Cyber Extortion

• Identity Theft and Government Impersonation

• Malware Dissemination (Virus, Worm, Ransomware, Trojan, Backdoor, …)

• Large Scale Attack (Cyberterrosim, Hacktivism,…)

• Denial of Service (Dos or DDOS)

• Cybervandalism

• Software Piracy and Counterfeiting of Programs • Data Leak • Cybercrime Risk Management

• Authentication (Multifactor Authentication, SSO, OTP, ...)

• Confidentiality and Privacy (Encryption, Anonymization, ...)

• Data Integrity

• Non-Repudiation

• High Availability

• Traceability and History of Electronic Acts and Actors

• Cryptographic Solutions

• Role of PKI Systems and The Electronic Identification

• Digital Signature Mechanisms and Standards

• Cyber Terrorism and Cyber Warfare

• Cost of Cybercrimes • Cybercrime – Illustrations with Case Studies

• The Future of Cybercrimes

• Recommendation on The Protection of The Cybercrimes for Government, Businesses and Individuals.


Type of Traning

Short Course

Training Activity Rate
Training activity Hours
9
Training activity Date
3/11/2025 - 5/11/2025
Training Activity Days
Sun- Mon- Tue
Start and End Time
09:00 - 15:00
Training Activity Classification
Digitization and Recent Development
Language
Arabic
Methodology
Blended
City
Amman
Deadline for registration
29/05/2025
Price For Jordanian
72 JOD
Price For Non Jordanian
135 US$

* Will be given discounts for groups
Open in new window