Skip to content
Cogniter
Home
About Us
Courses
Blog
Article
Contact Us
Log In / Register
Cogniter
Log In / Register
Home
About Us
Courses
Blog
Article
Contact Us
Courses
Home
Courses
Page 3
Search for:
Search
Select View:
Courses
Difficulty
Beginner
Expert
Intermediate
Reset Filters
Beginner
Cybersecurity
Phishing Awareness for Beginners
To provide a beginner-friendly yet comprehensive understanding of phishing attacks—what they are, how they work, how to recognize them, and what to do when you encounter one. This course equips you with best practices and…
Intermediate
Cybersecurity
Understanding Cybersecurity Policies & Frameworks
What key policies mean for your daily work
Global standards that shape security expectations
How to stay compliant and report violations
Intermediate
Cybersecurity
Wi-Fi & Public Network Risks
How to identify confidential, restricted, and public data
Where and how to store sensitive data securely
Common mistakes and how to avoid them
Intermediate
Cybersecurity
Secure Use of Mobile Devices
Mobile malware warning signs
Device security settings and MDM tools
Best practices for BYOD (Bring Your Own Device) environments
Intermediate
Cybersecurity
Social Engineering Tactics & Defense
Common emotional triggers used by attackers
Scenarios that exploit trust and urgency
How to verify identities and escalate concerns
Intermediate
Cybersecurity
Safe Internet & Wi-Fi Usage
How to avoid fake websites and malicious ads
Tips for securing home and public Wi-Fi networks
The risks of browser extensions and plugins
Expert
Cybersecurity
Cybersecurity Policy, Governance & Strategic Planning
Building and maintaining cybersecurity frameworks
Assigning roles and responsibilities
Reporting metrics and conducting strategic reviews
Expert
Cybersecurity
Regulatory & Legal Compliance
What laws apply to your industry
How to design policies that meet legal requirements
Avoiding costly data breach penalties
Expert
Cybersecurity
Penetration Testing Awareness
What happens during a penetration test
Preparing systems for ethical hacking
Understanding test findings and next steps
Intermediate
Cybersecurity
Insider Threats
Different types of insider threats and their motivations
Behavioral red flags to watch for
How to report and respond to suspicious activity
Intermediate
Cybersecurity
Phishing Deep Dive
How phishing attacks are designed and deployed
Behavioral signs that indicate a phishing scam
Steps to safely respond to suspected phishing messages
Intermediate
Cybersecurity
Malware Types & Behavior
How malware infiltrates devices and networks
Real-world examples of malware attacks
Practical ways to detect and prevent infections
1
2
3
4
5
Scroll to top