3 Year - Security Awareness Training
Software

Features

  • Security Standards
  • Human Assets

Description

Three real-world scenarios show you strategies and techniques hackers use to take control of your computer system. You’ll learn about the seven areas of an email that can contain red flags that alert you to a possible attack. The Danger Zone exercise will let you apply what you’ve learned.