Courses

Select View:

Courses

Difficulty

Phishing Awareness for Beginners

To provide a beginner-friendly yet comprehensive understanding of phishing attacks—what they are, how they work, how to recognize them, and what to do when you encounter one. This course equips you with best practices and…

Understanding Cybersecurity Policies & Frameworks

What key policies mean for your daily work

Global standards that shape security expectations

How to stay compliant and report violations

Wi-Fi & Public Network Risks

How to identify confidential, restricted, and public data

Where and how to store sensitive data securely

Common mistakes and how to avoid them

Secure Use of Mobile Devices

Mobile malware warning signs

Device security settings and MDM tools

Best practices for BYOD (Bring Your Own Device) environments

Social Engineering Tactics & Defense

Common emotional triggers used by attackers

Scenarios that exploit trust and urgency

How to verify identities and escalate concerns

Safe Internet & Wi-Fi Usage

How to avoid fake websites and malicious ads

Tips for securing home and public Wi-Fi networks

The risks of browser extensions and plugins

Cybersecurity Policy, Governance & Strategic Planning

Building and maintaining cybersecurity frameworks

Assigning roles and responsibilities

Reporting metrics and conducting strategic reviews

Regulatory & Legal Compliance

What laws apply to your industry

How to design policies that meet legal requirements

Avoiding costly data breach penalties

Penetration Testing Awareness

What happens during a penetration test

Preparing systems for ethical hacking

Understanding test findings and next steps

Insider Threats

Different types of insider threats and their motivations

Behavioral red flags to watch for

How to report and respond to suspicious activity

Phishing Deep Dive

How phishing attacks are designed and deployed

Behavioral signs that indicate a phishing scam

Steps to safely respond to suspected phishing messages

Malware Types & Behavior

How malware infiltrates devices and networks

Real-world examples of malware attacks

Practical ways to detect and prevent infections

Scroll to top

Course Access

This course is password protected. To access it please enter your password below: