Skip to content Skip to footer

Key Features

  • All classes instructor-led
  • Classes may be split into multiple sessions, minimum 4 hours for every session.
  • Obtain a recording of your business session to train or retrain employees in the future.
  • How computers, devices or individuals can be compromised.
  • Devices, operating system & app stores.
  • Web browsers and vulnerabilities.
  • Passwords.
  • Phishing and social engineering attacks.
  • Wi-fi security.
  • Social media security.
  • Malware & botnets.
  • Ransomware identity theft.
  • Data backups.
  • Web attacks.
  • Internet of things (IOT).
  • Vulnerabilities scanning.
  • Virtual private networks (VPN).
  • Network appliances.
  • Endpoint protection.
  • Physical security.