Courses

27 course(s)

img252-01.jpg
Cybersecurity Awareness Training

Evolution Academy’s eTraining platform delivers a complete awareness tra…


0 4 23
img252-01.jpg
Bring your own device (BYOD)

Bring your own device (BYOD) refers to the trend of employees using person…


0 4 8
img252-01.jpg
Business Continuity Management

Business continuity management (BCM) capabilities enable organizations to …


0 11 46
img252-01.jpg
Clear Desk and Clear Screen Policy

Clear desk and clear screen policy refers to practices related to ensuring…


0 8 93
img252-01.jpg
Email Scam

Email scam is an intentional deception for either personal gain or to dama…


0 14 92
img252-01.jpg
Information Classification

Information classification is as fundamental a part of securing your organ…


0 17 130
img252-01.jpg
Information Security Incident Management

Information Security Incident Management is the process of identifying, ma…


0 11 44
img252-01.jpg
Internet Frauds

Internet frauds are deceptive schemes online that aim to trick people into…


0 18 129