3 Year - Security Awareness Training
- Security Standards
- Human Assets
Three real-world scenarios show you strategies and techniques hackers use to take control of your computer system. You’ll learn about the seven areas of an email that can contain red flags that alert you to a possible attack. The Danger Zone exercise will let you apply what you’ve learned.