918博天堂·(中国区)首页

    NASZ KURS O CYBERBEZPIECZEŃSTWIE

     

    W tym kursie informujemy Cię w sześciu wykładach o cyberbezpieczeństwie w branży zabezpieczeń. Pierwszy wykład wyjaśnia pojęcia cyberbezpieczeństwa i hakowania komputerowego, a drugi wykład dotyczy cyberbezpieczeństwa produktów. Trzeci wykład porusza temat luk w zabezpieczeniach oraz wyjaśnia zarządzanie lukami w branży zabezpieczeń. Czwarty wykład pokazuje, jak włamać się do kamery IP i co zrobić, aby temu zapobiec. Piąty wykład wyjaśnia perspektywę prywatności w branży zabezpieczeń, a ostatni wykład kończy się sesją na temat wdrażania cyberbezpieczeństwa w praktyce.

    WYKŁADY

    Reset
    no-result
    No Match Data

    Lecture 1: Introduction to Cybersecurity

    This lecture explains the terms cybersecurity and computer hacking. It also provides an introduction to software vulnerabilities within the security industry. This lecture forms the foundation and sets the scene for the rest of the course.

    Lecture 2: Product Cybersecurity

    This lecture explains product cybersecurity and decribes how ‘Secure-by-Design’ can be implemented in the production process of a security camera. This lecture leverages the cybersecurity built-in capabilities of a Hikvision product.

    Lecture 3: Vulnerabilities

    This lecture explains the term ‘computer vulnerabilities’. This lecture discusses what are vulnerabilities, how are vulnerabilities found and how are vulnerabilities made public. It also shows the importance of good vulnerability management in today’s security world.

    Lecture 4: Tips & Tricks from an Ethical Hacker

    In this lecture, a well-known ethical hacker describes the configuration and software vulnerabilities of a camera and how they could be exploited. During this lecture tips will be provided how to prevent these computer penetrations.

    Lecture 5: Privacy & Compliance

    This lecture provides an overview of the current privacy legislation (GDPR), which is applicable to the security industry. It shows the different privacy responsibilities for the customer/end-user, installer and manufacturer of security cameras and provide guidance how to deal with privacy in certain use cases.

    Lecture 6: Security in Practice

    This lecture shows how the previous lectures can be implemented in practice. This lecture shows the cybersecurity risks towards a security camera and which security settings are build-in into the products that can be applied to counter the cybersecurity risks.

    Lecture 7:Hik-Connect Security Overview

    Hik-Connect security overview This lecture is an overview of Hik-Connect’s security compliance, and explanation of what types of data is stored in local regions. We also focus on what Hikvision has done to keep products safe and what installers and System Integrators need to consider when designing, implementing, and securing security systems.

    March 07, 2024
    loading ...
    Skontaktuj się z nami
    Zapytania Handlowe
    Zapytania Techniczne
    Wsparcie online
    Where to Buy
    Website Feedback
    Website Feedback
    Skontaktuj się z nami
    Hik-Partner Pro close
    Hik-Partner Pro
    Hik-Partner Pro
    Scan and download the app
    Download
    Hik-Partner Pro
    Hik-Partner Pro

    Get a better browsing experience

    You are using a web browser we don’t support. Please try one of the following options to have a better experience of our web content.