Skip to content
Tiraza
Home
About Us
Courses
Blog
Article
Contact Us
Log In / Register
Tiraza
Log In / Register
Home
About Us
Courses
Blog
Article
Contact Us
Courses
Home
Courses
Page 2
Search for:
Search
Select View:
Courses
Difficulty
Beginner
Expert
Intermediate
Reset Filters
Intermediate
Cybersecurity
Secure Use of Mobile Devices
Mobile malware warning signs
Device security settings and MDM tools
Best practices for BYOD (Bring Your Own Device) environments
Intermediate
Cybersecurity
Social Engineering Tactics & Defense
Common emotional triggers used by attackers
Scenarios that exploit trust and urgency
How to verify identities and escalate concerns
Intermediate
Cybersecurity
Safe Internet & Wi-Fi Usage
How to avoid fake websites and malicious ads
Tips for securing home and public Wi-Fi networks
The risks of browser extensions and plugins
Expert
Cybersecurity
Cybersecurity Policy, Governance & Strategic Planning
Building and maintaining cybersecurity frameworks
Assigning roles and responsibilities
Reporting metrics and conducting strategic reviews
Expert
Cybersecurity
Regulatory & Legal Compliance
What laws apply to your industry
How to design policies that meet legal requirements
Avoiding costly data breach penalties
Expert
Cybersecurity
Penetration Testing Awareness
What happens during a penetration test
Preparing systems for ethical hacking
Understanding test findings and next steps
Intermediate
Cybersecurity
Insider Threats
Different types of insider threats and their motivations
Behavioral red flags to watch for
How to report and respond to suspicious activity
Intermediate
Cybersecurity
Phishing Deep Dive
How phishing attacks are designed and deployed
Behavioral signs that indicate a phishing scam
Steps to safely respond to suspected phishing messages
Intermediate
Cybersecurity
Malware Types & Behavior
How malware infiltrates devices and networks
Real-world examples of malware attacks
Practical ways to detect and prevent infections
Expert
Cybersecurity
Data Encryption & Loss Prevention
Encryption standards and how they work
How to implement DLP across an organization
Avoiding data leaks through policy enforcement
Beginner
Cybersecurity
Reporting Security Concerns
What tools are in place to help you stay secure
When to contact IT or security teams
How to become part of your company’s cyber defense culture
Expert
Cybersecurity
Incident Response Planning
How to create effective response playbooks
Coordinating cross-functional teams under pressure
1
2
3
4
Scroll to top