About the CPD Course
Cyberattacks occur through a number of avenues.
These can generally be split into unprotected internet-facing systems or
services and user accounts or devices. With the latter, a user's account or
device is compromised, and when connected to the school network,
vulnerabilities are across other devices and accounts, followed by lateral
movement by the malicious actor until they are in control of sensitive data or
systems. This module takes a look at how to best raise awareness among your
users through simulated phishing.
Receive more information
CPD Provider
CPD Subsectors
Business Consultancy
Schools & Universities
IT Support Services
Cyber Security
Support & Training