Courses

  • 1 Lesson

    Best Practices for Secure Internet Browsing

    Browsing the internet has become a routine part of our daily activities, often involving the sharing of personal information without much consideration for potential risks.…
  • 1 Lesson

    How to Detect Vishing Attacks

    What Are Phone Scams and Vishing Attacks? You have probably heard of phishing when fraudsters send fake emails that look like they come from real…
  • 1 Lesson

    How to Secure Personal Data

    Modern-day theft scarcely resembles heists and burglaries of the past—it has evolved into the digital sphere, requiring us to learn new security practices alongside the old…
  • 1 Lesson

    Phishing Protection Tips

    Reports of online scams and cyberattacks are on the rise, but most people don’t heed them until it’s too late. So, what steps can you…
  • 1 Lesson

    Protecting Against Malware

    What Is Malware? Malware can leave you vulnerable to data loss, damaged devices, or even identity theft. Cybercriminals utilise malware to disrupt operations, compromise data,…
  • 1 Lesson

    SEO (Search Engine Optimisation)

    For the uninitiated, searching for things online might seem like magic. You type a few words in the search bar, click a button, and voila!…
  • 1 Lesson

    What is Artificial Intelligence

    From friendly robot sidekicks to villainous supercomputers, AI has long been a prominent feature in science fiction and fantasy. These fictional examples of AI show…
  • 1 Lesson

    What is Confidentiality in the Workplace?

    How do we figure out what’s confidential and what isn’t? Confidential information, like new product features, changes hands every day at work. Let’s look into…
  • 1 Lesson

    What Is Cybersecurity?

    What do you do to keep your workplace safe? Cybersecurity involves safeguarding the networks and devices you use to protect your data from online criminals. We…
  • 1 Lesson

    What is Multifactor Authentication (MFA)?

    Many websites verify your identity through a simple process using a username and password. A password is considered one layer of security or authentication. What…
  • 1 Lesson

    What is Online Security?

    How do you keep your home safe? At the minimum, most people lock the doors when they leave. Others install motion-sensitive lights or security cameras.…
  • 1 Lesson

    What is Phishing?

    In an era of increasing online threats, recognising phishing scams is essential to safeguarding your personal and financial information. In this course you will learn…
  • 1 Lesson

    What Is Social Engineering?

    We often hear about cyberattacks on organisations that result in data breaches, stolen funds, and other serious issues, but what we don’t typically hear is…