Courses

68 course(s)

img252-01.jpg
Clear Desk and Clear Screen Policy

Clear desk and clear screen policy refers to practices related to ensuring…


0 8 44
img252-01.jpg
Email Scam

Email scam is an intentional deception for either personal gain or to dama…


0 14 43
img252-01.jpg
Information Classification

Information classification is as fundamental a part of securing your organ…


0 17 81
img252-01.jpg
Information Security Incident Management

Information Security Incident Management is the process of identifying, ma…


0 11 44
img252-01.jpg
Internet Frauds

Internet frauds are deceptive schemes online that aim to trick people into…


0 18 80
img252-01.jpg
Internet of Things

IoT stands for Internet of Things, which refers to the network of intercon…


0 11 47
img252-01.jpg
IT Change Management

The goal of Change Management is to establish standard procedures for mana…


0 12 45
img252-01.jpg
Keep laptop safe while on travel

It's not just thieves who pose a threat on your precious laptop. Mundane t…


0 17 6