Second Level Modules

AN INNOVATIVE TRAINING WITH CONTINUOUS RELEASE SYSTEM

Maintaining a special focus on your workstation, and avoiding leaving critical or even sensitive information available and accessible to unauthorised persons, is a basic element Read more
With the COVID-19 crisis and the widespread engagement in remote working, mainly in the sense of teleworking or working from home, it becomes necessary to Read more
The COVID-19 emergency and the rapid recourse to smart-working have resulted in a swift increase in the use of information-sharing and collaboration tools, among which Read more
Another particular phishing technique that strikes through messaging systems such as WhatsApp, Messenger, Telegram, and SMS. This module, through a series of concrete examples, aims Read more
We return to the subject of phishing by recalling concepts already dealt with previously, assuming that our user, thanks to previous training, has gained a Read more
It is the most insidious of MALWARE, the one that causes the most damage and subjects individuals and organisations to blackmail from which it is Read more
This module takes an in-depth look at the most advanced authentication systems, both to encourage their use where this is technically possible, in order to Read more
We are increasingly interconnected and will become even more so. Technological evolution is leading us towards total interconnection, which is no longer just about people, Read more
This module focuses on two technological components that are needed to ensure connectivity on the move and therefore the mobility of people. They are two Read more
The classification of information is one of the key factors in information security management, but it is also one of the factors least understood by Read more
We are back to talking about data protection, with a view to security, and more strictly to privacy and the relationship with the various quality Read more
At the end of each level (1 year), we return to the subject of social engineering, and thus to attack techniques that use deception and Read more

Module

The Module is the logical learning unit that allows a specific training topic to be addressed. The training consists of 36 self-consistent modules, which are activated monthly. Full completion of a module and excellent completion of the 3 lessons inside the module, will give user a medal.

Lesson

The Lesson is the basic unit of learning and is available in both video and text format. Passing a lesson and moving on to the next is achieved by correctly answering at least 3 of the 4 questions proposed in the final learning test. The “excellent” completion is achieved by answering all 4 proposed questions correctly.

Block

The Block is a logical evaluation unit on the quality of learning, and consists of 3 modules. At the end of each block the participant is offered an assessment test consisting of 5 multiple choice questions, the successful completion of which entitles the participant to a Cup if he has acquired all the medals available in the training course.

Ask for a DEMO version