Social engineering

You can access the entire course on our e-learning platform by logging in here.

If you do not have an account, you can try it for free.

The course

About the course

In this course, we show you how cybercriminals can take advantage of people by disguising themselves as someone they know. Victims to social engineering could end up providing confidential data, trade secrets, or be manipulated to transfer money to a cybercriminal’s account.

Phishing
Want to learn more?

Phishing has been estimated to be the biggest current cyber security threat to organisations. This blog post will discuss what phishing is and why they are getting harder and harder to spot. We also give you tips on how to train your team, so that they do not fall victim to phishing schemes.  

Want to learn more?

Phishing has been estimated to be the biggest current cyber security threat to organisations. This blog post will discuss what phishing is and why they are getting harder and harder to spot. We also give you tips on how to train your team, so that they do not fall victim to phishing schemes.  

Phishing

Other material

Create awareness in your organisation with our posters. You can download the posters and hang them on your walls in your organisation.

In this way your employees willl be reminded of what to be aware of when they see a the posters.

cp poster

Related courses

helt
Category: GDPR

Protect Personal Data

Learning objectives: Why it is important to protect personal data, how your organisation’s rules and guidelines help to protect personal data and how your actions make a difference and can help protect personal data

Read More »
Top