Skip to content
Intermediate
- What key policies mean for your daily work
- Global standards that shape security expectations
- How to stay compliant and report violations
Intermediate
- How to identify confidential, restricted, and public data
- Where and how to store sensitive data securely
- Common mistakes and how to avoid them
Intermediate
- Mobile malware warning signs
- Device security settings and MDM tools
- Best practices for BYOD (Bring Your Own Device) environments
Intermediate
- Common emotional triggers used by attackers
- Scenarios that exploit trust and urgency
- How to verify identities and escalate concerns
Intermediate
- How to avoid fake websites and malicious ads
- Tips for securing home and public Wi-Fi networks
- The risks of browser extensions and plugins
Expert
- Building and maintaining cybersecurity frameworks
- Assigning roles and responsibilities
- Reporting metrics and conducting strategic reviews
Expert
- What laws apply to your industry
- How to design policies that meet legal requirements
- Avoiding costly data breach penalties
Expert
- What happens during a penetration test
- Preparing systems for ethical hacking
- Understanding test findings and next steps
Intermediate
- Different types of insider threats and their motivations
- Behavioral red flags to watch for
- How to report and respond to suspicious activity
Intermediate
- How phishing attacks are designed and deployed
- Behavioral signs that indicate a phishing scam
- Steps to safely respond to suspected phishing messages
Intermediate
- How malware infiltrates devices and networks
- Real-world examples of malware attacks
- Practical ways to detect and prevent infections
Expert
- Encryption standards and how they work
- How to implement DLP across an organization
- Avoiding data leaks through policy enforcement
Scroll to top