Our cyber security course's online modules take the student through practical steps to stay secure

What is Social Engineering?
Most of the data breaches you read about in the news today start off with an attack vector referred to as Social Engineering. Unsuspecting users are being targeted with phone calls, phishing, spear phishing, portable media and other types of attacks in order to gain access to corporate networks. The majority of IT users have no technical background and are unaware of the techniques and methods hackers use to target them.
Cyber Awareness Course
Let us help you protect your company before you are hacked!
We cover useful security tools on the market and advice on each

Our Course
Our video training program is structured into 9 modules. Every module finishes with a review quiz and some useful links. Attendees who have worked through all 9 modules will be presented with a final exam of 20 questions to test their acquired knowledge across all topics. You will gain knowledge and awareness on how to prevent breaches by recognizing common threats to users and businesses, understanding how hackers think and attack, and general Cyber Security Awareness in your day to day work. The course will also help you protect your home computer, smartphones, tablets and Wifi properly.
Why us?
The Cyber Awareness course is brought to you by an industry leading individual with a long and successful track of providing Security Consulting, Training, Ethical Hacking and Penetration Testing to clients around the globe. Among his customers are governments, large financial institutions, online betting companies and other high profile businesses. The author of our Cyber Awareness Training is Martin Voelk. Martin has 23 years of IT Security experience and co-founded of Cyber 51, a well-known and respected U.S. Cyber Security company. He holds the CISSP, Cisco CCIE, OSCP, OSWP and other certifications.
-
Author holds highest industry IT Security certifications
-
First point of contact for all sophisticated security needs
-
Deep understanding of security needs and working dynamics
-
Author has 20+ years professional work experience in IT Security
-
Author consults for governments, military & financial organizations