Role-Based Program
Learn how AI is powering scams to another level – enabling scammers to create convincing and highly targeted attacks at unprecedented scale and speed.
All Role-Based Program 43 Results
In this course, learners will explore the different threats to Operational Technology (OT) and ways to secure the OT environment. Learners will also discover the importance of implementing situational awareness to maintain cyber hygiene when working remotely and using their own device.
Cloud computing has allowed for greater collaboration and mobility, enabling teams to work together from anywhere in the world. It is important to carefully consider the security and compliance risks associated with implementing cloud services.
In this course, learners will explore the different techniques cyber criminals use to hack their victims. Learners will also discover the risks associated with security breaches when dealing with personal and sensitive information.
In this course, learners will discover what motivates scammers and the different techniques and psychological tactics they use to trick their victims. They will also explore the common threats and learn how to protect themselves and the organisation they represent.
In this course, learners will explore the most common types of security threats including Business Email Compromise (BEC), risks associated with using their own device and Shadow IT.
This course is aimed at IT professionals and provides an in-depth examination of ransomware attacks. By understanding how ransomware attacks work, participants will be better equipped to protect their organisations and implement effective countermeasures.
Get the practical skills necessary to identify, manage, and update software components to prevent vulnerabilities when developing web applications, as outlined in the OWASP Top 10:2021.
Sort by