Created by Traliant
Category Cybersecurity Compliance > Data Privacy & Protection
Introduction
Data Classification
Common Security Threat
Social Engineering & Phishing
Internet Security
Physical Security & Insider Threats
AI-enabled cyber threats & Deepfakes
Reporting a Data Breach 9. Conclusion
How to spot phishing and social engineering schemes
How to spot and report common cybersecurity incidents including physical and insider threats
How to protect against AI enabled cyber attacks and deepfakes
Chrome, Edge, Firefox, Safari (Mac)
English
Or
Subscribe to Coggno Prime
Unlock unlimited access to all courses with a Coggno Prime Subscription!