Courses

Select View:

Courses

Difficulty

Data Encryption & Loss Prevention

Encryption standards and how they work

How to implement DLP across an organization

Avoiding data leaks through policy enforcement

Reporting Security Concerns

What tools are in place to help you stay secure

When to contact IT or security teams

How to become part of your company’s cyber defense culture

Incident Response Planning

How to create effective response playbooks

Coordinating cross-functional teams under pressure

Secure Work-from-Home Practices

What qualifies as a security incident

How and where to report problems

Why fast response helps protect everyone

Secure Application Use

SaaS governance and access controls

Common misconfigurations that lead to breaches

Cloud Safety 101

Common manipulation tactics used by attackers

How to stay calm and verify before acting

Examples of real-life social engineering attempts

Endpoint Protection Strategies

How to secure devices using EDR tools

Strategies to enforce company-wide device policies

Mobile & BYOD Safety

How hackers exploit public networks

Secure practices when using mobile devices

When and how to use VPNs

Network Security Architecture

Firewall rules and best practices

Role of intrusion detection and prevention systems

Threat Hunting & Analysis Techniques

Techniques for log analysis and anomaly detection

Using indicators of compromise (IOCs) to track malicious activity

Social Engineering Awareness

What personal information is most at risk

How to manage privacy settings on websites and apps

Why over-sharing online can be dangerous

Advanced Malware Detection & Response

Real-world examples of malware attacks

Practical ways to detect and prevent infections

Scroll to top

Course Access

This course is password protected. To access it please enter your password below: