SECURE- Throughout the day - Part 3.pdf

Kresimir Popovic
Kresimir PopovicSenior Software Engineer em ENEA

SECURE- Throughout the day - Part 3

Certificate
SECURE: throughout the day - Episode III
Siemens Information Technology and
the Chief Information Security Officer attest that
Kresimir Popovic
(Z001NVMP)
has successfully completed the Security Online Training
"SECURE: throughout the day Episode III" on Jun 2, 2014.
Training Content
This training program focuses on an on-going and dangerous form of cyber-attack, called Advanced Persistent
Threats (APT). The web-based training shows how these attacks work and which patterns they follow.
Furthermore, handling rules are given to help minimize the risk of a successful APT within our company. A
second key point of the training is the secure usage of Social Media and how to protect against Social
Engineering - both commonly used by potential attackers in order to gain information on their potential target.
Additionally there is a concise characterization of the protection classes and the related handling requirements.
Munich, Jun 2, 2014
This is an automatically generated document and therefore valid without signature.
Siegfried Russwurm
Member of the Managing Board
Responsible for IT
intranet.siemens.com/csts

Recomendados

SECURE- Throughout the day - Part 2.pdf por
SECURE- Throughout the day - Part 2.pdfSECURE- Throughout the day - Part 2.pdf
SECURE- Throughout the day - Part 2.pdfKresimir Popovic
7 visualizações1 slide
SECURE- Throughout the day - Part 1.pdf por
SECURE- Throughout the day - Part 1.pdfSECURE- Throughout the day - Part 1.pdf
SECURE- Throughout the day - Part 1.pdfKresimir Popovic
11 visualizações1 slide
Certificate PASE por
Certificate PASECertificate PASE
Certificate PASEDavid Leonel Santa Cruz Alfaro
30 visualizações1 slide
Certificate - Protection against Social Engineering.pdf por
Certificate - Protection against Social Engineering.pdfCertificate - Protection against Social Engineering.pdf
Certificate - Protection against Social Engineering.pdfKresimir Popovic
4 visualizações1 slide
Certificate_Secure_Through_The_Day_02 por
Certificate_Secure_Through_The_Day_02Certificate_Secure_Through_The_Day_02
Certificate_Secure_Through_The_Day_02Patrick Thorpe
12 visualizações1 slide
Zero Day Exploits por
Zero Day ExploitsZero Day Exploits
Zero Day ExploitsAlexis Adams
2 visualizações42 slides

Mais conteúdo relacionado

Similar a SECURE- Throughout the day - Part 3.pdf

Security Awareness Training from KnowBe4 por
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Carol Montgomery Adams
1.8K visualizações11 slides
Top Cyber News Magazine Daniel Ehrenreich por
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich TopCyberNewsMAGAZINE
15 visualizações22 slides
CYBERSECURITY TRACK.pptx por
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxlevimax2
4 visualizações7 slides
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL por
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODELSECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODELIJCSEIT Journal
34 visualizações7 slides
Credential Harvesting Using Man in the Middle Attack via Social Engineering por
Credential Harvesting Using Man in the Middle Attack via Social EngineeringCredential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social Engineeringijtsrd
8 visualizações4 slides
The Charter of Trust por
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
560 visualizações24 slides

Similar a SECURE- Throughout the day - Part 3.pdf(20)

Security Awareness Training from KnowBe4 por Carol Montgomery Adams
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
Carol Montgomery Adams1.8K visualizações
Top Cyber News Magazine Daniel Ehrenreich por TopCyberNewsMAGAZINE
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich
TopCyberNewsMAGAZINE15 visualizações
CYBERSECURITY TRACK.pptx por levimax2
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
levimax24 visualizações
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL por IJCSEIT Journal
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODELSECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
IJCSEIT Journal34 visualizações
Credential Harvesting Using Man in the Middle Attack via Social Engineering por ijtsrd
Credential Harvesting Using Man in the Middle Attack via Social EngineeringCredential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social Engineering
ijtsrd8 visualizações
The Charter of Trust por DefCamp
The Charter of TrustThe Charter of Trust
The Charter of Trust
DefCamp560 visualizações
Certificate por Shailendra Rawat
CertificateCertificate
Certificate
Shailendra Rawat175 visualizações
End User Security Awareness Presentation por Cristian Mihai
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
Cristian Mihai40.3K visualizações
Concept Of Cyber Security.pdf por FahadZaman38
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdf
FahadZaman38197 visualizações
Journal of Computer and System Sciences 80 (2014) 973–993Con por karenahmanny4c
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
karenahmanny4c12 visualizações
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx por croysierkathey
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
croysierkathey3 visualizações
Comparative Analysis of Phishing Tools por ijtsrd
Comparative Analysis of Phishing ToolsComparative Analysis of Phishing Tools
Comparative Analysis of Phishing Tools
ijtsrd15 visualizações
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty por Government
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
Government216 visualizações
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu... por Ivanti
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
Ivanti107 visualizações
Cybersecurity education catalog sae september 2021 por TrustwaveHoldings
Cybersecurity education catalog sae september 2021Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021
TrustwaveHoldings1.3K visualizações
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga... por IRJET Journal
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
IRJET Journal4 visualizações
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENT por ijesajournal
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENTESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENT
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENT
ijesajournal35 visualizações
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges por ijtsrd
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
ijtsrd48 visualizações
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds por Happiest Minds Technologies
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsWhitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Happiest Minds Technologies227 visualizações

Mais de Kresimir Popovic

Amazon_AWS_IAM_2023_Cert.pdf por
Amazon_AWS_IAM_2023_Cert.pdfAmazon_AWS_IAM_2023_Cert.pdf
Amazon_AWS_IAM_2023_Cert.pdfKresimir Popovic
6 visualizações1 slide
Functional Programming Principles - 03.06.2013.pdf por
Functional Programming Principles - 03.06.2013.pdfFunctional Programming Principles - 03.06.2013.pdf
Functional Programming Principles - 03.06.2013.pdfKresimir Popovic
15 visualizações1 slide
Open_Source_Software_Basics.pdf por
Open_Source_Software_Basics.pdfOpen_Source_Software_Basics.pdf
Open_Source_Software_Basics.pdfKresimir Popovic
3 visualizações1 slide
Open_Source_Software_Overview.pdf por
Open_Source_Software_Overview.pdfOpen_Source_Software_Overview.pdf
Open_Source_Software_Overview.pdfKresimir Popovic
3 visualizações1 slide
Global Bribery and Corruption Certificate.pdf por
Global Bribery and Corruption Certificate.pdfGlobal Bribery and Corruption Certificate.pdf
Global Bribery and Corruption Certificate.pdfKresimir Popovic
3 visualizações1 slide
Siemens Compliance (SIECO).pdf por
Siemens Compliance (SIECO).pdfSiemens Compliance (SIECO).pdf
Siemens Compliance (SIECO).pdfKresimir Popovic
20 visualizações1 slide

Mais de Kresimir Popovic(20)

Amazon_AWS_IAM_2023_Cert.pdf por Kresimir Popovic
Amazon_AWS_IAM_2023_Cert.pdfAmazon_AWS_IAM_2023_Cert.pdf
Amazon_AWS_IAM_2023_Cert.pdf
Kresimir Popovic6 visualizações
Functional Programming Principles - 03.06.2013.pdf por Kresimir Popovic
Functional Programming Principles - 03.06.2013.pdfFunctional Programming Principles - 03.06.2013.pdf
Functional Programming Principles - 03.06.2013.pdf
Kresimir Popovic15 visualizações
Open_Source_Software_Basics.pdf por Kresimir Popovic
Open_Source_Software_Basics.pdfOpen_Source_Software_Basics.pdf
Open_Source_Software_Basics.pdf
Kresimir Popovic3 visualizações
Open_Source_Software_Overview.pdf por Kresimir Popovic
Open_Source_Software_Overview.pdfOpen_Source_Software_Overview.pdf
Open_Source_Software_Overview.pdf
Kresimir Popovic3 visualizações
Global Bribery and Corruption Certificate.pdf por Kresimir Popovic
Global Bribery and Corruption Certificate.pdfGlobal Bribery and Corruption Certificate.pdf
Global Bribery and Corruption Certificate.pdf
Kresimir Popovic3 visualizações
Siemens Compliance (SIECO).pdf por Kresimir Popovic
Siemens Compliance (SIECO).pdfSiemens Compliance (SIECO).pdf
Siemens Compliance (SIECO).pdf
Kresimir Popovic20 visualizações
Global Competition Certificate.pdf por Kresimir Popovic
Global Competition Certificate.pdfGlobal Competition Certificate.pdf
Global Competition Certificate.pdf
Kresimir Popovic4 visualizações
udemy - oauth2 and openid crash course.pdf por Kresimir Popovic
udemy - oauth2 and openid crash course.pdfudemy - oauth2 and openid crash course.pdf
udemy - oauth2 and openid crash course.pdf
Kresimir Popovic7 visualizações
Udemy-Starting with Quarkus - March 2022.pdf por Kresimir Popovic
Udemy-Starting with Quarkus - March 2022.pdfUdemy-Starting with Quarkus - March 2022.pdf
Udemy-Starting with Quarkus - March 2022.pdf
Kresimir Popovic18 visualizações
Kubernetes_DeepDive_02-2022.pdf por Kresimir Popovic
Kubernetes_DeepDive_02-2022.pdfKubernetes_DeepDive_02-2022.pdf
Kubernetes_DeepDive_02-2022.pdf
Kresimir Popovic17 visualizações
NGINX Server Deep Dive March 2002.pdf por Kresimir Popovic
NGINX Server Deep Dive March 2002.pdfNGINX Server Deep Dive March 2002.pdf
NGINX Server Deep Dive March 2002.pdf
Kresimir Popovic11 visualizações
dockerquickstartlegacy-190215093445.pdf por Kresimir Popovic
dockerquickstartlegacy-190215093445.pdfdockerquickstartlegacy-190215093445.pdf
dockerquickstartlegacy-190215093445.pdf
Kresimir Popovic3 visualizações
Remote Communication across cultures - Session.pdf por Kresimir Popovic
Remote Communication across cultures - Session.pdfRemote Communication across cultures - Session.pdf
Remote Communication across cultures - Session.pdf
Kresimir Popovic5 visualizações
Atos Financial Management Training.pdf por Kresimir Popovic
Atos Financial Management Training.pdfAtos Financial Management Training.pdf
Atos Financial Management Training.pdf
Kresimir Popovic2 visualizações
Stepping out of your comfort zone - Videocast Faculty.pdf por Kresimir Popovic
Stepping out of your comfort zone - Videocast Faculty.pdfStepping out of your comfort zone - Videocast Faculty.pdf
Stepping out of your comfort zone - Videocast Faculty.pdf
Kresimir Popovic3 visualizações
Conquering the Challenges of Public Speaking.pdf por Kresimir Popovic
Conquering the Challenges of Public Speaking.pdfConquering the Challenges of Public Speaking.pdf
Conquering the Challenges of Public Speaking.pdf
Kresimir Popovic6 visualizações
Capturing and keeping your audience’s attention - Session.pdf por Kresimir Popovic
Capturing and keeping your audience’s attention - Session.pdfCapturing and keeping your audience’s attention - Session.pdf
Capturing and keeping your audience’s attention - Session.pdf
Kresimir Popovic14 visualizações
Security and Safety awareness.pdf por Kresimir Popovic
Security and Safety awareness.pdfSecurity and Safety awareness.pdf
Security and Safety awareness.pdf
Kresimir Popovic10 visualizações
Code of Ethics.pdf por Kresimir Popovic
Code of Ethics.pdfCode of Ethics.pdf
Code of Ethics.pdf
Kresimir Popovic7 visualizações
Analyze and assess your stress - Session.pdf por Kresimir Popovic
Analyze and assess your stress - Session.pdfAnalyze and assess your stress - Session.pdf
Analyze and assess your stress - Session.pdf
Kresimir Popovic3 visualizações

Último

Top-5-production-devconMunich-2023.pptx por
Top-5-production-devconMunich-2023.pptxTop-5-production-devconMunich-2023.pptx
Top-5-production-devconMunich-2023.pptxTier1 app
8 visualizações40 slides
EV Charging App Case por
EV Charging App Case EV Charging App Case
EV Charging App Case iCoderz Solutions
9 visualizações1 slide
ShortStory_qlora.pptx por
ShortStory_qlora.pptxShortStory_qlora.pptx
ShortStory_qlora.pptxpranathikrishna22
5 visualizações10 slides
Agile 101 por
Agile 101Agile 101
Agile 101John Valentino
9 visualizações20 slides
Dapr Unleashed: Accelerating Microservice Development por
Dapr Unleashed: Accelerating Microservice DevelopmentDapr Unleashed: Accelerating Microservice Development
Dapr Unleashed: Accelerating Microservice DevelopmentMiroslav Janeski
12 visualizações29 slides
Bootstrapping vs Venture Capital.pptx por
Bootstrapping vs Venture Capital.pptxBootstrapping vs Venture Capital.pptx
Bootstrapping vs Venture Capital.pptxZeljko Svedic
14 visualizações17 slides

Último(20)

Top-5-production-devconMunich-2023.pptx por Tier1 app
Top-5-production-devconMunich-2023.pptxTop-5-production-devconMunich-2023.pptx
Top-5-production-devconMunich-2023.pptx
Tier1 app8 visualizações
EV Charging App Case por iCoderz Solutions
EV Charging App Case EV Charging App Case
EV Charging App Case
iCoderz Solutions9 visualizações
ShortStory_qlora.pptx por pranathikrishna22
ShortStory_qlora.pptxShortStory_qlora.pptx
ShortStory_qlora.pptx
pranathikrishna225 visualizações
Agile 101 por John Valentino
Agile 101Agile 101
Agile 101
John Valentino9 visualizações
Dapr Unleashed: Accelerating Microservice Development por Miroslav Janeski
Dapr Unleashed: Accelerating Microservice DevelopmentDapr Unleashed: Accelerating Microservice Development
Dapr Unleashed: Accelerating Microservice Development
Miroslav Janeski12 visualizações
Bootstrapping vs Venture Capital.pptx por Zeljko Svedic
Bootstrapping vs Venture Capital.pptxBootstrapping vs Venture Capital.pptx
Bootstrapping vs Venture Capital.pptx
Zeljko Svedic14 visualizações
360 graden fabriek por info33492
360 graden fabriek360 graden fabriek
360 graden fabriek
info33492143 visualizações
Airline Booking Software por SharmiMehta
Airline Booking SoftwareAirline Booking Software
Airline Booking Software
SharmiMehta7 visualizações
BushraDBR: An Automatic Approach to Retrieving Duplicate Bug Reports por Ra'Fat Al-Msie'deen
BushraDBR: An Automatic Approach to Retrieving Duplicate Bug ReportsBushraDBR: An Automatic Approach to Retrieving Duplicate Bug Reports
BushraDBR: An Automatic Approach to Retrieving Duplicate Bug Reports
Ra'Fat Al-Msie'deen8 visualizações
Myths and Facts About Hospice Care: Busting Common Misconceptions por Care Coordinations
Myths and Facts About Hospice Care: Busting Common MisconceptionsMyths and Facts About Hospice Care: Busting Common Misconceptions
Myths and Facts About Hospice Care: Busting Common Misconceptions
Care Coordinations7 visualizações
Introduction to Git Source Control por John Valentino
Introduction to Git Source ControlIntroduction to Git Source Control
Introduction to Git Source Control
John Valentino6 visualizações
Gen Apps on Google Cloud PaLM2 and Codey APIs in Action por Márton Kodok
Gen Apps on Google Cloud PaLM2 and Codey APIs in ActionGen Apps on Google Cloud PaLM2 and Codey APIs in Action
Gen Apps on Google Cloud PaLM2 and Codey APIs in Action
Márton Kodok15 visualizações
AI and Ml presentation .pptx por FayazAli87
AI and Ml presentation .pptxAI and Ml presentation .pptx
AI and Ml presentation .pptx
FayazAli8713 visualizações
Keep por Geniusee
KeepKeep
Keep
Geniusee78 visualizações
predicting-m3-devopsconMunich-2023-v2.pptx por Tier1 app
predicting-m3-devopsconMunich-2023-v2.pptxpredicting-m3-devopsconMunich-2023-v2.pptx
predicting-m3-devopsconMunich-2023-v2.pptx
Tier1 app9 visualizações
Unlocking the Power of AI in Product Management - A Comprehensive Guide for P... por NimaTorabi2
Unlocking the Power of AI in Product Management - A Comprehensive Guide for P...Unlocking the Power of AI in Product Management - A Comprehensive Guide for P...
Unlocking the Power of AI in Product Management - A Comprehensive Guide for P...
NimaTorabi215 visualizações
Software evolution understanding: Automatic extraction of software identifier... por Ra'Fat Al-Msie'deen
Software evolution understanding: Automatic extraction of software identifier...Software evolution understanding: Automatic extraction of software identifier...
Software evolution understanding: Automatic extraction of software identifier...
Ra'Fat Al-Msie'deen10 visualizações
The Era of Large Language Models.pptx por AbdulVahedShaik
The Era of Large Language Models.pptxThe Era of Large Language Models.pptx
The Era of Large Language Models.pptx
AbdulVahedShaik7 visualizações
nintendo_64.pptx por paiga02016
nintendo_64.pptxnintendo_64.pptx
nintendo_64.pptx
paiga020165 visualizações
Using Qt under LGPL-3.0 por Burkhard Stubert
Using Qt under LGPL-3.0Using Qt under LGPL-3.0
Using Qt under LGPL-3.0
Burkhard Stubert13 visualizações

SECURE- Throughout the day - Part 3.pdf

  • 1. Certificate SECURE: throughout the day - Episode III Siemens Information Technology and the Chief Information Security Officer attest that Kresimir Popovic (Z001NVMP) has successfully completed the Security Online Training "SECURE: throughout the day Episode III" on Jun 2, 2014. Training Content This training program focuses on an on-going and dangerous form of cyber-attack, called Advanced Persistent Threats (APT). The web-based training shows how these attacks work and which patterns they follow. Furthermore, handling rules are given to help minimize the risk of a successful APT within our company. A second key point of the training is the secure usage of Social Media and how to protect against Social Engineering - both commonly used by potential attackers in order to gain information on their potential target. Additionally there is a concise characterization of the protection classes and the related handling requirements. Munich, Jun 2, 2014 This is an automatically generated document and therefore valid without signature. Siegfried Russwurm Member of the Managing Board Responsible for IT intranet.siemens.com/csts