COURSE AUTHOR –
John Courtenay
1. How to protect and secure your organisation’s network from inside and outside threats
2. How to make sure employees are following best practices
3. How to improve user awareness of phishing and vishing scams
4. Different types of vulnerability testing and associated legal considerations