Courses

Select View:

Courses

Difficulty
Intermediate

Secure Use of Mobile Devices

  • Mobile malware warning signs
  • Device security settings and MDM tools
  • Best practices for BYOD (Bring Your Own Device) environments
Intermediate

Social Engineering Tactics & Defense

  • Common emotional triggers used by attackers
  • Scenarios that exploit trust and urgency
  • How to verify identities and escalate concerns
Intermediate

Safe Internet & Wi-Fi Usage

  • How to avoid fake websites and malicious ads
  • Tips for securing home and public Wi-Fi networks
  • The risks of browser extensions and plugins
Expert

Cybersecurity Policy, Governance & Strategic Planning

  • Building and maintaining cybersecurity frameworks
  • Assigning roles and responsibilities
  • Reporting metrics and conducting strategic reviews
Expert

Regulatory & Legal Compliance

  • What laws apply to your industry
  • How to design policies that meet legal requirements
  • Avoiding costly data breach penalties
Expert

Penetration Testing Awareness

  • What happens during a penetration test
  • Preparing systems for ethical hacking
  • Understanding test findings and next steps
Intermediate

Insider Threats

  • Different types of insider threats and their motivations
  • Behavioral red flags to watch for
  • How to report and respond to suspicious activity
Intermediate

Phishing Deep Dive

  • How phishing attacks are designed and deployed
  • Behavioral signs that indicate a phishing scam
  • Steps to safely respond to suspected phishing messages
Intermediate

Malware Types & Behavior

  • How malware infiltrates devices and networks
  • Real-world examples of malware attacks
  • Practical ways to detect and prevent infections
Expert

Data Encryption & Loss Prevention

  • Encryption standards and how they work
  • How to implement DLP across an organization
  • Avoiding data leaks through policy enforcement
Beginner

Reporting Security Concerns

  • What tools are in place to help you stay secure
  • When to contact IT or security teams
  • How to become part of your company’s cyber defense culture
Expert

Incident Response Planning

  • How to create effective response playbooks

  • Coordinating cross-functional teams under pressure

Scroll to top

Course Access

This course is password protected. To access it please enter your password below: