Courses

18 course(s)

img252-01.jpg
Cyber Incident Response Management Foundation

With the ever-increasing reliance on technologies, IT and Cybersecurity ar…


0 4 9
img252-01.jpg
Standard Cyber Security Awareness

Evolution Academy’s eTraining platform delivers a complete awareness tra…


0 7 12
img252-01.jpg
Cybersecurity Awareness Training (ATL)

Evolution Academy’s eTraining platform delivers a complete awareness trai…


0 4 7
img252-01.jpg
Phishing

Email phishing scams have become increasingly frequent in all online activ…


0 14 2
img252-01.jpg
Bring your own device (BYOD)

Bring your own device (BYOD) refers to the trend of employees using person…


0 10 2
img252-01.jpg
Business Continuity Management

Business continuity management (BCM) capabilities enable organizations to …


0 10 2
img252-01.jpg
Clear Desk and Clear Screen Policy

Clear desk and clear screen policy refers to practices related to ensuring…


0 10 2
img252-01.jpg
Email Scams

Email scam is an intentional deception for either personal gain or to dama…


0 4 0