Cyber-Security
What is Deception and Disruption Technology?
Understand how common types of deception and disruption technologies can be used to capture information on an attacker and their techniques.
Cyber-Security
Understand how common types of deception and disruption technologies can be used to capture information on an attacker and their techniques.
Cyber-Security
Understand the common forms of physical security controls that can protect an organisation's assets.
Cyber-Security
Understand what Zero Trust security is, how it works, and why it is essential in modern networks.
Cyber-Security
Understand the concept of a security gap analysis and why they are important.
Cyber-Security
Compare and contrast various types of security controls.
Networking
What is a VPN? A VPN, is short for "Virtual Private Network", these allow you to create a secure network connection over a less secure public network. VPNs encrypt your internet traffic to make it challenging for third parties to track your online activities or steal your data.
Cyber-Security
Google Dorking is a powerful technique that leverages advanced search operators to refine search results and locate specific information indexed by Google.
Cyber-Security
What is OSINT? Who uses OSINT? OSINT Sources. How is OSINT gathered? Applications of OSINT. Benefits of OSINT. Disadvantages of OSINT. Future Impacts on OSINT.
Cyber-Security
What are the Three Primary Strands of Cyber-Security? What is Governance? What is Risk Management? What is Compliance?
Cyber-Security
What is Security Culture? Why is a positive Security Culture Important? What benefits does it bring? How to integrate a positive security culture into your business?
Cyber-Security
What is the access management IAAA framework? How does it work? What are some examples?
Cyber-Security
What is Defence-In-Depth? What are the Layers of Defence? How is it implemented? What is Defence-In-Breadth? What is The Human Layer?