Role-Based Program
Our Role-Based courses deliver focused security training for technical and high-risk roles such as IT, developers, and system administrators. These courses dive deeper into topics like infrastructure hardening, application security, and incident response so specialists can better protect your environment.
All Role-Based Program 41 Results
Human Resources (HR) and Finance teams play a critical role in maintaining organisational information security. By handling large volumes of personal, financial, and sensitive business data, they are frequent targets for cyberattacks and social engineering threats.
Social engineering is a manipulation technique where scammers exploit human psychology to trick individuals into performing actions or revealing confidential information that they normally wouldn’t. This course explores the tactics used by scammers, the vulnerabilities within helpdesk operations, and actionable strategies to detect and prevent these threats.
In this course, learners will explore the different threats to Operational Technology (OT) and ways to secure the OT environment. Learners will also discover the importance of implementing situational awareness to maintain cyber hygiene when working remotely and using their own device.
Cloud computing has allowed for greater collaboration and mobility, enabling teams to work together from anywhere in the world. It is important to carefully consider the security and compliance risks associated with implementing cloud services.
In this course, learners will explore the different techniques cyber criminals use to hack their victims. Learners will also discover the risks associated with security breaches when dealing with personal and sensitive information.
In this course, learners will discover what motivates scammers and the different techniques and psychological tactics they use to trick their victims. They will also explore the common threats and learn how to protect themselves and the organisation they represent.
In this course, learners will explore the most common types of security threats including Business Email Compromise (BEC), risks associated with using their own device and Shadow IT.
This course is aimed at IT professionals and provides an in-depth examination of ransomware attacks. By understanding how ransomware attacks work, participants will be better equipped to protect their organisations and implement effective countermeasures.
Server-Side Request Forgery (SSRF) is a critical web application security risk and a recognised vulnerability in the OWASP Top 10:2021. This course explains how SSRF vulnerabilities work, why they occur, and the potential impact on web application security. Learners will gain practical skills to identify, prevent, and mitigate SSRF vulnerabilities in web applications, using guidance aligned with OWASP Top 10:2021 and Python-based coding examples.
Server-Side Request Forgery (SSRF) is a critical web application security risk and a recognised vulnerability in the OWASP Top 10:2021. This course explains how SSRF vulnerabilities work, why they occur, and the potential impact on web application security. Learners will gain practical skills to identify, prevent, and mitigate SSRF vulnerabilities in web applications, using guidance aligned with OWASP Top 10:2021 and Pseudocode-based coding examples.
Get the practical skills necessary to identify, manage, and update software components to prevent vulnerabilities when developing web applications, as outlined in the OWASP Top 10:2021.
Software & Data Integrity Failures is a critical category in the OWASP Top 10:2021, highlighting the risks of unauthorised changes to software and data. This course explains what these failures are, why they occur, and the impact they can have on web application security. Learners will develop a shared understanding of secure development practices and gain practical skills to identify, prevent, and address integrity vulnerabilities, including implementing integrity checks and secure update mechanisms. Coding examples are presented using pseudocode.
Get expert guidance to match your people with the right awareness training for maximum impact.
Sort by