Cyberpsychology and Social Engineering
Dr. Sheeba Armoogum holds a PhD in Cybersecurity and is an Associate Professor in the Department of ICT at the University of Mauritius (UoM). She is a globally respected Cybersecurity Architect with over 20 years of expertise spanning academia, applied research, digital policy, and high-level governance. She also serves as an Independent Non-Executive Director at Rogers Capital Technology, where she advises on digital resilience, cybersecurity strategy, and AI ethics.
Dr. Sheeba has advanced cybersecurity innovation through two landmark patents filed and issued by the South African Patent Office. She is also the sole inventor of “An Extended Genetic Technique Based Intrusion Detection and Prevention System” (WIPO Classification H04L), commercially referred to as CyberThreat DNA. She is the co-inventor of “AI-Driven Ethical Governance System and Method for Unified Cyber Threat Intelligence and Digital Forensics Incident Response” (WIPO Classification G06F), a next-generation platform that unifies CTI (Cyber Threat Intelligence) and DFIR (Digital Forensics Incident Response). The system emphasises scalability, automation, and ethical compliance, offering proactive threat prediction and bias-mitigated forensic decision-making. At the University of Mauritius, Dr. Sheeba leads the CyberSecurity & Forensics Research Group (CSFRG), supervises PhD research in cybersecurity, cyberpsychology, and AI, and publishes extensively in high-impact Q1 and Q2 journals. A former Head of Department and a national Subject Specialist in Cybersecurity, she is also deeply engaged in digital literacy outreach, ethical technology advocacy, and international cyber governance.
Cyberpsychology and Social Engineering
Cyberpsychology and Social Engineering intensive 4-hour training delves into the cognitive and behavioural mechanisms exploited in social engineering attacks within cybersecurity contexts. It covers advanced psychological theories related to persuasion, influence, and decision-making biases that adversaries leverage to manipulate individuals and bypass technical defenses. Participants will analyse sophisticated social engineering techniques, including phishing, pretexting, baiting, and deepfake exploitation, supported by case studies from recent cyber incidents. The course also emphasises practical detection strategies, risk assessment methodologies, and the design of effective countermeasures to mitigate human-factor vulnerabilities in organisational security frameworks.