Role-Based Program

Our Role-Based courses deliver focused security training for technical and high-risk roles such as IT, developers, and system administrators. These courses dive deeper into topics like infrastructure hardening, application security, and incident response so specialists can better protect your environment.

All Role-Based Program 41 Results

Course Image Compliance-Related Security
Course Image Compliance-Related Security
NZ Information Security for HR & Finance​ Role-Based Program

Human Resources (HR) and Finance teams play a critical role in maintaining organisational information security. By handling large volumes of personal, financial, and sensitive business data, they are frequent targets for cyberattacks and social engineering threats.

Course Image IT Security
Course Image IT Security
Social Engineering Attacks Against the Helpdesk​ Role-Based Program

Social engineering is a manipulation technique where scammers exploit human psychology to trick individuals into performing actions or revealing confidential information that they normally wouldn’t. This course explores the tactics used by scammers, the vulnerabilities within helpdesk operations, and actionable strategies to detect and prevent these threats.​

Course Image Device Security
Course Image Device Security
Operational Technology Awareness Role-Based Program

In this course, learners will explore the different threats to Operational Technology (OT) and ways to secure the OT environment. Learners will also discover the importance of implementing situational awareness to maintain cyber hygiene when working remotely and using their own device.

Course Image Workplace Security
Course Image Workplace Security
Introduction to Cloud Computing Role-Based Program

Cloud computing has allowed for greater collaboration and mobility, enabling teams to work together from anywhere in the world. It is important to carefully consider the security and compliance risks associated with implementing cloud services.​

Course Image Information Security
Course Image Information Security
Information Security for HR & FINANCE Role-Based Program

In this course, learners will explore the different techniques cyber criminals use to hack their victims. Learners will also discover the risks associated with security breaches when dealing with personal and sensitive information.

Course Image Workplace Security
Course Image Workplace Security
General Staff Security Awareness (All Staff) Role-Based Program

In this course, learners will discover what motivates scammers and the different techniques and psychological tactics they use to trick their victims. They will also explore the common threats and learn how to protect themselves and the organisation they represent.

Course Image Workplace Security
Course Image Workplace Security
Executive Security Awareness Role-Based Program

In this course, learners will explore the most common types of security threats including Business Email Compromise (BEC), risks associated with using their own device and Shadow IT.

Course Image IT Security
Course Image IT Security
CyberSecureIT: Ransomware Controls Role-Based Program

This course is aimed at IT professionals and provides an in-depth examination of ransomware attacks. By understanding how ransomware attacks work, participants will be better equipped to protect their organisations and implement effective countermeasures.

Course Image IT Security
Course Image IT Security
CyberSecureIT: OWASP: Server-Side Request Forgery (Python) Role-Based Program

Server-Side Request Forgery (SSRF) is a critical web application security risk and a recognised vulnerability in the OWASP Top 10:2021. This course explains how SSRF vulnerabilities work, why they occur, and the potential impact on web application security. Learners will gain practical skills to identify, prevent, and mitigate SSRF vulnerabilities in web applications, using guidance aligned with OWASP Top 10:2021 and Python-based coding examples.

Course Image IT Security
Course Image IT Security
CyberSecureIT: OWASP: Server-Side Request Forgery (Pseudocode Version) Role-Based Program

Server-Side Request Forgery (SSRF) is a critical web application security risk and a recognised vulnerability in the OWASP Top 10:2021. This course explains how SSRF vulnerabilities work, why they occur, and the potential impact on web application security. Learners will gain practical skills to identify, prevent, and mitigate SSRF vulnerabilities in web applications, using guidance aligned with OWASP Top 10:2021 and Pseudocode-based coding examples.

Course Image IT Security
Course Image IT Security
CyberSecureIT: OWASP Vulnerable & Outdated Components Role-Based Program

Get the practical skills necessary to identify, manage, and update software components to prevent vulnerabilities when developing web applications, as outlined in the OWASP Top 10:2021.

Course Image IT Security
Course Image IT Security
CyberSecureIT: OWASP Software & Data Integrity Failures (Pseudocode Version) Role-Based Program

Software & Data Integrity Failures is a critical category in the OWASP Top 10:2021, highlighting the risks of unauthorised changes to software and data. This course explains what these failures are, why they occur, and the impact they can have on web application security. Learners will develop a shared understanding of secure development practices and gain practical skills to identify, prevent, and address integrity vulnerabilities, including implementing integrity checks and secure update mechanisms. Coding examples are presented using pseudocode.

Before Image
Not sure which course fits your team?

Get expert guidance to match your people with the right awareness training for maximum impact.

Get Personalised Advice

Sort by

Phriendly Phishing Logo