courses.cybersmart.academy
Open in
urlscan Pro
2606:4700:4400::6812:239f
Public Scan
URL:
https://courses.cybersmart.academy/
Submission Tags: phishingrod
Submission: On November 13 via api from DE — Scanned from DE
Submission Tags: phishingrod
Submission: On November 13 via api from DE — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Skip to main content CYBER SMART ACADEMY Toggle menu Menu * Home * All Courses * Back to Main site * Sign In CYBER SMART ACADEMY COURSES Empower Your Skills. Secure Your Future Find out more Enroll now CHOOSE ONE OF OUR PROGRAMS AND TAKE THE FIRST STEPS TODAY! DECRYPT THE LAW, HACK THE THREATS Cybersecurity Course for Legal Professionals We're excited to launch 'Decrypt the Law, Hack the Threats': Your one-stop course for mastering cybersecurity in law. Safeguard your practice, navigate global laws, understand the role of AI and guide your clients in the digital age. Enroll today CYBER ELITE Do you want a better paying, dynamic, interesting job? We invite you on a 4-month journey (3 months of cyber technical sessions + 1 month of HR & career support) with us where we give 100%, and working together you gain knowledge and skills as a Cyber analyst, level 1 but also career support and advice. BENEFITS What will you learn? At the end of this Program you will have both technical knowledge, at entry level Cyber Analyst, but you will also be prepared to apply for a new job. * Cyber Security Basics: 30% theory, 70% practice * What about the types of entry level cybersecurity jobs in an organization (Example organizational chart of a Security department in a company) * How to think like a Cyber Analyst and work like a Cyber Analyst * How to update your resume to reflect the knowledge gained in the Program * Cum să comunici , cum să te prezinți la un interviu pt un rol de Cyber Analyst. ENROLL FOR CYBER ELITE NOW Start your Cyber Analist career today Find out more ALL COURSES Browse our courses and start your training process today * CYBERSECURITY KICKSTART Course To be able to defend/attack a system, you first need to know how it works. Starting from this idea, we developed a course to cover the basic concepts of the IT environment: Networking, Hardware, Programming, Cryptography and the CIA triad. 400 Lei * UNDERSTANDING AND IMPLEMENTING CYBER DECEPTION Course Cyber deception tools (honeypots, honeynets, canary tokens, etc.) are cyber security tools used to lure and capture cyber attackers. They are often used to detect cyber threats and gather information about attackers’ attempts to break in... 470 Lei * VULNERABILITY ASSESSMENT/SCANNING Course Vulnerability scanning (or "Vulnerability Scanning") refers to the process of identifying the vulnerabilities of a system or an infrastructure. It involves the use of automated tools and specific methods to identify system weaknesses. 470 Lei View more courses * * * * © cybersmart.academy. All rights reserved. Teach online with Thinkific Open in a new window