
3 Year - Security Awareness Training
Software
Features
- Security Standards
- Human Assets
Description
Three real-world scenarios show you strategies and techniques hackers use to take control of your computer system. You’ll learn about the seven areas of an email that can contain red flags that alert you to a possible attack. The Danger Zone exercise will let you apply what you’ve learned.