Role-Based Program

Learn how AI is powering scams to another level – enabling scammers to create convincing and highly targeted attacks at unprecedented scale and speed.

All Role-Based Program 43 Results

Course Image Workplace Security
Course Image Workplace Security
Malay GSA – Kesedaran Keselamatan Kakitangan Umum Role-Based Program

Course Image Workplace Security
Course Image Workplace Security
GSA – Kesadaran Keamanan Umum Role-Based Program

Course Image Workplace Security
Course Image Workplace Security
Chinese GSA 一般安全意识 Role-Based Program

Course Image Device Security
Course Image Device Security
Operational Technology Awareness Role-Based Program

In this course, learners will explore the different threats to Operational Technology (OT) and ways to secure the OT environment. Learners will also discover the importance of implementing situational awareness to maintain cyber hygiene when working remotely and using their own device.

Course Image Workplace Security
Course Image Workplace Security
Introduction to Cloud Computing Role-Based Program

Cloud computing has allowed for greater collaboration and mobility, enabling teams to work together from anywhere in the world. It is important to carefully consider the security and compliance risks associated with implementing cloud services.​

Course Image Information Security
Course Image Information Security
Information Security for HR & FINANCE Role-Based Program

In this course, learners will explore the different techniques cyber criminals use to hack their victims. Learners will also discover the risks associated with security breaches when dealing with personal and sensitive information.

Course Image Workplace Security
Course Image Workplace Security
General Staff Security Awareness (All Staff) Role-Based Program

In this course, learners will discover what motivates scammers and the different techniques and psychological tactics they use to trick their victims. They will also explore the common threats and learn how to protect themselves and the organisation they represent.

Course Image Workplace Security
Course Image Workplace Security
Executive Security Awareness Role-Based Program

In this course, learners will explore the most common types of security threats including Business Email Compromise (BEC), risks associated with using their own device and Shadow IT.

Course Image IT Security
Course Image IT Security
CyberSecureIT: Ransomware Controls Role-Based Program

This course is aimed at IT professionals and provides an in-depth examination of ransomware attacks. By understanding how ransomware attacks work, participants will be better equipped to protect their organisations and implement effective countermeasures.

Course Image IT Security
Course Image IT Security
CyberSecureIT: OWASP: Server-Side Request Forgery (Python) Role-Based Program

Course Image IT Security
Course Image IT Security
CyberSecureIT: OWASP: Server-Side Request Forgery (Pseudocode Version) Role-Based Program

Course Image IT Security
Course Image IT Security
CyberSecureIT: OWASP Vulnerable & Outdated Components Role-Based Program

Get the practical skills necessary to identify, manage, and update software components to prevent vulnerabilities when developing web applications, as outlined in the OWASP Top 10:2021.

Sort by

Phriendly Phishing Logo