PECB Training center
  • HOME
  • ISO 31000
  • CYBER DEFENCE
    • Using indicators to enhance defense capabilities​​​
    • Vulnerability Handling
    • Proactive detection of incidents
    • Presenting, correlating and filtering various feeds
  • GDPR
  • Contact

ICT Security 2016

​LECTURES

LECTURES
​
  • ​ATM Security
  • ​Enhancing Security of Electronic Payments - Decision IQ​
  • Mobile and Application Security
  • Cloud Based NFC Mobile Payments - Security Risks and Protection Measures
  • How to Protect Classified Information? - Software or Hardware Encryption
  • Payment Cards Security PSI DSS
  • Linux, Open Source and Security
  • What Code Come In Must Come Out - Threads at iOS and Android Applications
  • Anatomy of a Social Engineering Attack
  • Endpoint Security, New Technologies That Are Replacing/Complementing Traditional Antivirus
  • App Centric Computing - Impact on Your IT
  • Tor Network - How to Achieve Anonymity?
  • Printing Security
  • Creating WiFi NSA Station
  • How to Protect Classified Information? - Software or Hardware Encryption
  • The Safety of Cryptography
  • Cyber Crime​
Proudly powered by Weebly
  • HOME
  • ISO 31000
  • CYBER DEFENCE
    • Using indicators to enhance defense capabilities​​​
    • Vulnerability Handling
    • Proactive detection of incidents
    • Presenting, correlating and filtering various feeds
  • GDPR
  • Contact