Report a bug
cloud_upload Upload


mail_outline Message


Gadgetless 1 enrollments • 0 likes

The Social Engineering course covers topics on: - difference between a technical and non-technical attack - different types of social engineering - what to do if you are the…

Gadgetless 3 enrollments • 0 likes

The Security Outside the Office module covers topics on: attack methods that put your information at risk, the risks of using a portable storage device, the difference between a…

Gadgetless 0 enrollments • 0 likes

The Ransomware module covers topics on: what ransomware is and how it is delivered, ransomware's effect, minimizing the threat of ransomware, and reporting ransomware attacks.

Gadgetless 7 enrollments • 0 likes

Personally Identifiable Information (PII) focuses on the laws and regulations that govern the protection of sensitive personal data, security measures that can be taken to protect…

Gadgetless 0 enrollments • 0 likes

The Insider Threats course covers topics on: danger insider threats pose, the three types of insider threats, and what to do if you observe suspicious activity. Course…

keyboard_arrow_up Top