Justification,Rationale,Overall Objectives and Expected Outcomes of the Course

JUSTIFICATION AND RATIONALE OF THE COURSE

This course is multi-disciplinary. It is designed to suit all levels of people who use computers and embedded computers as tools of information processing. People working with sensitive digital information will find the worthiness of this course because it entails the better ways of dealing with the Fifth potential theater for International Conflicts. While kinetic attack against financial institutions, government institutions, Vital Installations and potential Information Centers would destroy the institutional infrastructures, Cyber-attack would interrupt, destroy, still, disguise, and even modify potential information in a target institution to create turmoil similar to the use of kinetic attacks. In this said perspectives, this course invites Government officials, Police Forces, Military Forces, Intelligence Officers, people working with Financial Institutions, Non-Government Institutions, and Religious organizations. Private sectors are highly invited to 

the course for the best protection of their digitally processed information. 

If you are individually working or dealing with digital information, then do not worry because we will help you to the best most in delivering the knowledge of not only to identify security threats but also to protect your digital information against attacks to create turmoil similar to the use of kinetic attacks.

In this said perspectives, this course invites Government officials, Police Forces, Military Forces, Intelligence Officers, people working with Financial Institutions, Non-Government Institutions, and Religious organizations. Private sectors are highly invited to the course for the best protection of their digitally processed information. If you are individually working or dealing with digital information, then do not worry because we will help you to the best most in delivering the knowledge of not only to identify security threats but also to protect your digital information against attacks

OVERALL COURSE OBJECTIVES

  1. To acquaint participants with the knowledge, skills and attitudes on Cyber Security
  2. To enable participants concatenate Cyber Security with their day to day activities

 EXPECTED OUTCOMES

Upon completion of the course, a participant will be able to

  1. Identify different methods used by cyber attackers to deter individuals, organizational or Institutional digital information
  1. Apply different acquired skills, knowledge and attitudes towards preventing digital information from cyber attacks
Winfrid Mapunda
Co-ordinator