Skip to main content

Course Overviews

Below are the course overviews that will provide you with a summary of the key points covered in the courses, and can be used a quick reminder of what to watch out for to ensure you remain protected…

Sam McDougall
Updated by Sam McDougall

Below are the course overviews that will provide you with a summary of the key points covered in the courses, and can be used a quick reminder of what to watch out for to ensure you remain protected from cyber attacks.

Example:

Downloads:

Account takeover.pdf

AI identity theft.pdf

Anti-money laundering and bribery.pdf

Artificial intelligence.pdf

CEO fraud.pdf

Credit card fraud.pdf

Cyber fundamentals.pdf

Cyber impersonation tactics.pdf

Data breaches.pdf

Debunking cybersecurity myths.jpg

Deepfakes.jpg

Essential guide to scams & phishing.jpg

GDPR in education.pdf

Go phish.pdf

Handling sensitive data.pdf

Identity theft.pdf

Insider threats.pdf

Malware.pdf

Managing passwords.pdf

Mobile devices.pdf

Online scams.pdf

Online self defence.pdf

Online shopping.pdf

Passphrases.pdf

Personal security.pdf

Phishing 101.pdf

Physical devices.pdf

Physical security.pdf

QR code attacks.pdf

Ransomware.pdf

Remote working.pdf

Remote and workplace security.pdf

Safe homeworking.pdf

Safe internet usage.pdf

Smishing and vishing.pdf

Social engineering.pdf

Social media.pdf

Spear phishing.pdf

Spot the phish.pdf

Workplace security.pdf

How did we do?

Wallpapers

Contact