
AI in cybersecurity:
use AI in a safe way
Be aware of cyber security risks when using AI and learn how to avoid its pitfalls.

AI in cybersecurity:
protect your data and privacy
Apply the best practices when working with AI and understanding the ethics of responsible use of AI.
✔ GDPR

Authentication techniques:
explore cutting-edge methods
Dive deep into advanced authentication strategies, including authentication keys, hardware hacking, behavioural biometrics, EIDAS 2.0 and MFA for top-notch security.
✔ SOC2 ✔ NIS2 ✔ ISO27001 ✔ IBP FO

Keeping apps & devices safe: how to protect your family
List your family's devices and apps, then apply essential security steps to ensure online safety.
✔ ICDL ✔ DigComp

Advanced family protection: key measures to implement
Boost your family’s digital safety by enhancing privacy settings, regularly updating software, and creating backups.
✔ ICDL ✔ DigComp ✔ GDPR

Data management and
protection: the next level
Master the essentials of safe data disposal, retention, classification, back-up management, and cloud storage.
✔ SOC2 ✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO

Fake news: identify and
counter misinformation
Develop skills to recognise deepfakes, voice clones, and more, and learn how to effectively counteract misinformation.

Cyber security & ethics
challenges and responsibilities
Delve into the ethical dimensions of cyber security and their impact on society and privacy.

Secure connectivity techniques:
explore advanced methods
Learn how to secure network connections, including best practices for Wi-Fi security, Virtual Private Networks (VPNs), and zero trust security models.
✔ NIS2 ✔ NIST ✔ ISO27001 ✔ IBP FO

Financial fraud:
deep dive
Dive deep into the sophisticated methods cybercriminals use to commit financial fraud and learn advanced strategies to protect your online presence.
✔ PCI DSS ✔ NIST

Hybrid working:
cybersecurity best practices
Learn how to maintain a cyber proof hybrid work environment, protecting both in-office and remote employees.
✔ NIS2 ✔ ISO27001 ✔ IBP FO

Cybersecure collaboration : working in team
Learn how to build a team risk inventory and how to mitigate those risks with best practices for your team’s security.
✔ NIS2 ✔ ISO27001 ✔ IBP FO