Courses

Select View:

Courses

Difficulty
Beginner

Phishing Awareness for Beginners

To provide a beginner-friendly yet comprehensive understanding of phishing attacks—what they are, how they work, how to recognize them, and what to do when you encounter one. This course equips you with best practices and…
Intermediate

Understanding Cybersecurity Policies & Frameworks

  • What key policies mean for your daily work
  • Global standards that shape security expectations
  • How to stay compliant and report violations
Intermediate

Wi-Fi & Public Network Risks

  • How to identify confidential, restricted, and public data
  • Where and how to store sensitive data securely
  • Common mistakes and how to avoid them
Intermediate

Secure Use of Mobile Devices

  • Mobile malware warning signs
  • Device security settings and MDM tools
  • Best practices for BYOD (Bring Your Own Device) environments
Intermediate

Social Engineering Tactics & Defense

  • Common emotional triggers used by attackers
  • Scenarios that exploit trust and urgency
  • How to verify identities and escalate concerns
Intermediate

Safe Internet & Wi-Fi Usage

  • How to avoid fake websites and malicious ads
  • Tips for securing home and public Wi-Fi networks
  • The risks of browser extensions and plugins
Expert

Cybersecurity Policy, Governance & Strategic Planning

  • Building and maintaining cybersecurity frameworks
  • Assigning roles and responsibilities
  • Reporting metrics and conducting strategic reviews
Expert

Regulatory & Legal Compliance

  • What laws apply to your industry
  • How to design policies that meet legal requirements
  • Avoiding costly data breach penalties
Expert

Penetration Testing Awareness

  • What happens during a penetration test
  • Preparing systems for ethical hacking
  • Understanding test findings and next steps
Intermediate

Insider Threats

  • Different types of insider threats and their motivations
  • Behavioral red flags to watch for
  • How to report and respond to suspicious activity
Intermediate

Phishing Deep Dive

  • How phishing attacks are designed and deployed
  • Behavioral signs that indicate a phishing scam
  • Steps to safely respond to suspected phishing messages
Intermediate

Malware Types & Behavior

  • How malware infiltrates devices and networks
  • Real-world examples of malware attacks
  • Practical ways to detect and prevent infections
Scroll to top

Course Access

This course is password protected. To access it please enter your password below: