I.T Security Essential Training
About this Course This course is the first step to learn the most effective steps to prevent cybercrime occurrences and identify threats with hands-on techniques…
About this Course This course is the first step to learn the most effective steps to prevent cybercrime occurrences and identify threats with hands-on techniques…
This two-day course covers a wide range of baseline topics, including terminologies, the basics of computer networks, security policies, incident r…
This course provides practical, to-the-point training for the busy executive, in everyday language, complete with examples that are easy to underst…
In a world where smartphones store gigabytes of personally identifiable information, human negligence remains the single biggest threat to the secu…
Mobile devices are often a key factor in criminal cases, intrusions, IP theft, security threats, accident reconstruction, and more.
This course aims to enable investigators to investigate the Apple devices they encounter.
This is an introductory course that will explain the concepts of computer forensics as well as demonstrations of proper collections of digital
You cannot protect what you do not know, and understanding forensic capabilities and artefacts is a fundamental cog of information security.
Course: IFIS/CS/1004 Mode: IND| ORG | GEN. Availability: PUB Data at rest has proved to a more lucrative venture for cybercriminals owing to the fact…
Learn about integrated endpoint protection, network security risk management and enhanced user behaviour analysis for predictive security protectio…
Please confirm you want to block this member.
You will no longer be able to:
Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.