وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
7

AI & Cybersecurity: Threats, Global Actors, and Trends-2025

سرفصل های دوره

How AI is Changing Cybersecurity, Global Threats, and Defense


1 - Introduction
  • 1 -Historical overview of CyberSecurity - Threats and Trends
  • 2 -Current state of the cybersecurity landscape
  • 3 -Key Challenges and Opportunities in Cyber Security

  • 2 - AI-powered malware and its impact
  • 1 -How Attackers are using AI for Malicious Purposes
  • 2 -AI-powered malware and its impact
  • 3 -Defending against AI driven Cyber Attacks

  • 3 - The Role of AI in Information Operations (IO)
  • 1 -AI Driven disinformation and propaganda campaigns
  • 2 -Detecting and mitigating AI-powered IO
  • 3 -The ethics of using AI in information warfare
  • 4 -The future of AI in information warfare

  • 4 - The Next Phase of AI and Security
  • 1 -The Next Phase of AI and Security
  • 2 -AI for proactive threat detection and response
  • 3 -AI-powered security automation
  • 4 -The future of AI in cybersecurity

  • 5 - The Big Four Russia, China, Iran, and North Korea
  • 1 -Overview of state-sponsored cyberattacks
  • 2 -Motivations and capabilities of the Big Four
  • 3 -Case studies of major cyberattacks

  • 6 - Russias Cyber Warfare Tactics
  • 1 -The Evolution of Russias Cyber Doctrine
  • 2 -The impact of the conflict in Ukraine on cyberattacks
  • 3 -Targeting critical infrastructure and government institutions
  • 4 -Disinformation and propaganda campaigns
  • 5 -The Role of Cyber Proxies and Non-State Actors
  • 6 -Cyber Espionage and Intelligence Gathering

  • 7 - Chinas Growing Cyber Capabilities
  • 1 -Chinas Cyber Dragon An Overview
  • 2 -Fueling the Fire Chinas Investments in Cyber Warfare
  • 3 -The PLAs Cyber Force Structure and Strategy
  • 4 -Made in China 2.0 Intellectual Property Theft and Espionage
  • 5 -Case Studies When China Hacked the World
  • 6 -The Digital Silk Road Cyber Espionage and the Belt and Road Initiative
  • 7 -The Great Firewalls Long Shadow Censorship, Surveillance, and Cyber Power
  • 8 -Dragon vs. Eagle Chinas Role in the Global Cyber Arms Race
  • 9 -The Future is Now Predicting Chinas Cyber Trajectory
  • 10 -Cooperation or Conflict China and the Future of Cyberspace

  • 8 - Irans Cyberattacks and Regional Tensions
  • 1 -The Dawn of Cyber Conflict Irans Early Cyber Activities
  • 2 -Rising Stakes The Stuxnet Catalyst
  • 3 -Enter the Global Stage Targeting Energy and Financial Sectors
  • 4 -Shadow Warriors Irans Use of Proxy Groups
  • 5 -Escalating Regional Tensions Cyber as a Weapon of Influence
  • 6 -The Present The Israel-Hamas Conflict and its Cyber Implications

  • 9 - North Koreas Exploitation of the Supply Chain
  • 1 -The Origins How North Korea Became a Cyber Power
  • 2 -Building the Cyber Army The Rise of the Lazarus Group
  • 3 -The Rise of AI-Powered Cyber Warfare
  • 4 -A Regime Fueled by Cybercrime Revenue Generation through Hacking
  • 5 -Beyond the Borders North Koreas Supply Chain Attacks
  • 5 -Beyond the Borders North Koreas Supply Chain Attacks
  • 7 -The Future of North Korean Cyber Operations

  • 10 - The Threat Landscape in 2025
  • 1 -A World on the Edge-Cybersecurity in a High-Stakes Era
  • 2 -Key Trends Shaping the Future of Cybersecurity
  • 3 -The Rise of AI-Powered Cyber Warfare
  • 4 -Emerging Threats and Vulnerabilities
  • 5 -The Deepfake Dilemma Trust in a World of Digital Illusions
  • 6 -The Geopolitical Cyber Chessboard Nations at War in the Digital Realm
  • 7 -The Cybercrime Economy Ransomware, Dark Web Markets, and Digital Extortion
  • 8 -The Quantum Threat Breaking Encryption in an Instant
  • 9 -Supply Chain Infiltration The Weakest Link in Global Security
  • 10 -Weaponized IoT When Smart Devices Become Cyber Soldiers
  • 11 -The Battle for Data Privacy Governments vs. Big Tech vs. Hackers
  • 12 -The Cyber Defense Revolution How the World is Fighting Back
  • 13 -The Future of Cybersecurity Jobs Warriors of the Digital Battlefield
  • 14 -The Road Ahead Are We Ready for the Cyber Storm of the Future
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 45377
    حجم: 4238 مگابایت
    مدت زمان: 256 دقیقه
    تاریخ انتشار: ۲۵ مرداد ۱۴۰۴
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید