{"id":24077,"date":"2023-01-04T17:54:00","date_gmt":"2023-01-04T17:54:00","guid":{"rendered":"http:\/\/35.157.126.229\/first-level-modules\/"},"modified":"2024-09-09T08:28:45","modified_gmt":"2024-09-09T08:28:45","slug":"cyber-guru-awareness-first-level-modules","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-first-level-modules\/","title":{"rendered":"First-level modules"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;2560px&#8221; custom_margin=&#8221;150px||||false|false&#8221; custom_padding=&#8221;|||10%|false|false&#8221; custom_padding_tablet=&#8221;|||10%|false|false&#8221; custom_padding_phone=&#8221;|5%||5%|false|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Inter|700|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;60px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; header_font_size_tablet=&#8221;60px&#8221; header_font_size_phone=&#8221;42px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>First-level modules<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Security Awareness Training \/ <span style=\"color: #f18a00;\">First-level modules<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-2ng.webp&#8221; custom_margin=&#8221;|||0px|false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; custom_padding_tablet=&#8221;0px||0px||true|false&#8221; custom_padding_phone=&#8221;0px||0px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/Phishing.webp&#8221; title_text=&#8221;Phishing&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>PHISHING is the most common attack technique used by cyber criminals. <span>It is particularly underhand because it is based on a deception, which seeks to induce the potential victim to perform an action allowing the criminal to launch their attack. It is essential to recognise this in order to take the necessary countermeasures.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/Password.webp&#8221; title_text=&#8221;Password&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>One of the pillars of Cyber Security is the PASSWORD: the access key to all those IT resources that must have guaranteed secure and confidential access. Managing PASSWORDS is therefore a basic element of defensive strategies for people and the organisation. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/Social-Media.webp&#8221; title_text=&#8221;Social-Media&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>SOCIAL MEDIA is a new way of socialising that conceals multiple risks. <span>Informed use of these tools is the only solution to protect you and your organisation from the potential risks of sharing individual and professional content online<\/span>.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;10px||10px||true|false&#8221; custom_padding_tablet=&#8221;10px||10px||true|false&#8221; custom_padding_phone=&#8221;10px||10px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/09\/Privacy-Personal-Data.png&#8221; title_text=&#8221;Privacy &#038; Personal Data&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; alt=&#8221;Privacy &#038; Personal Data&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>The introduction of the European General Data Protection Regulation has increased organisations&#8217; sensitivity to PRIVACY and the protection of sensitive data. <span>It is important that all members of an organisation become more sensitive to data protection.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/Mobile-App.webp&#8221; title_text=&#8221;Mobile-App&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>MOBILE DEVICES are becoming more critical tools every day and represent the riskiest overlap between the personal and professional dimensions. Only <span>by enabling best practices for their use can we increase the level of security and data protection.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/09\/Modulo-AI.png&#8221; title_text=&#8221;Modulo AI&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; alt=&#8221;Artificial Intelligence&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>This module explores how the use of AI tools can pose risks to computer security, either by enhancing existing threats or by generating new ones. The module will also recall some good practices, emphasising the decisive role of the human factor in prevention.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;10px||10px||true|false&#8221; custom_padding_tablet=&#8221;10px||10px||true|false&#8221; custom_padding_phone=&#8221;10px||10px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/USB-Storage.webp&#8221; title_text=&#8221;USB-Storage&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>All USB devices, and in particular storage devices, are potentially critical points when it comes to protecting confidential information. Knowing <span>the risks associated with USB devices is the starting point to avoid data theft.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/malware.webp&#8221; title_text=&#8221;malware&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>MALWARE in general and RANSOMWARE in particular have quickly become prominent in the news, highlighting all their dangers. An ill-informed click is enough to infect your device \u2013 <span>anti-virus software cannot guarantee total protection against these malicious programs.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/e-mail-security.webp&#8221; title_text=&#8221;email-security&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>EMAIL is an increasingly important tool that plays a central and particularly critical role in professional life. EMAILS are often used to exchange sensitive information. Underestimating the security aspect can pose serious risks for you and your organisation.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;10px||10px||true|false&#8221; custom_padding_tablet=&#8221;10px||10px||true|false&#8221; custom_padding_phone=&#8221;10px||10px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/Web-Browsing.webp&#8221; title_text=&#8221;Web-Browsing&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Browsing the WEB can conceal many risks. <span>Good knowledge of some specific features of websites and browsers in particular can help greatly reduce the level of risk. Knowing how to browse the WEB safely is a basic step to avoid cyber risks.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/09\/Deepfake.png&#8221; title_text=&#8221;Deepfake&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; alt=&#8221;Deepfake&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]Deepfakes are an advanced technique that uses artificial intelligence to create fake but extremely realistic digital content. The risks associated with the use of this technology are analysed, including potential abuse in the personal and professional spheres, and practical tips are offered to recognise and protect against deepfakes.[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/Social-Engineering-1.webp&#8221; title_text=&#8221;Social-Engineering-1&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Social engineering is the mother of all cyber attack strategies. It focuses on deception and psychological <span>manipulation to pursue malevolent ends. To make the attack more effective, this strategy is focused on acquiring information about the intended victim. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; background_enable_image=&#8221;off&#8221; background_position=&#8221;bottom_center&#8221; custom_padding=&#8221;50px||50px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp&#8221; alt=&#8221;More&#8221; title_text=&#8221;More&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; positioning=&#8221;absolute&#8221; position_origin_a=&#8221;bottom_right&#8221; vertical_offset=&#8221;-200px&#8221; horizontal_offset=&#8221;85px&#8221; vertical_offset_tablet=&#8221;-55px&#8221; vertical_offset_phone=&#8221;-90px&#8221; vertical_offset_last_edited=&#8221;on|phone&#8221; horizontal_offset_tablet=&#8221;-55px&#8221; horizontal_offset_phone=&#8221;-50px&#8221; horizontal_offset_last_edited=&#8221;on|phone&#8221; position_origin_a_tablet=&#8221;top_left&#8221; position_origin_a_phone=&#8221;top_left&#8221; position_origin_a_last_edited=&#8221;on|phone&#8221; position_origin_f_tablet=&#8221;&#8221; position_origin_f_phone=&#8221;&#8221; position_origin_f_last_edited=&#8221;on|phone&#8221; position_origin_r_tablet=&#8221;&#8221; position_origin_r_phone=&#8221;&#8221; position_origin_r_last_edited=&#8221;on|phone&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; positioning_tablet=&#8221;absolute&#8221; positioning_phone=&#8221;absolute&#8221; positioning_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Line&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; max_width=&#8221;1440px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;70px|170px|0px|170px|false|true&#8221; custom_padding_tablet=&#8221;|100px||100px|false|true&#8221; custom_padding_phone=&#8221;70px|20px|0px|20px|false|true&#8221; border_radii=&#8221;off|10px|10px||&#8221; box_shadow_style=&#8221;preset2&#8243; box_shadow_horizontal=&#8221;0px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik|300|||||||&#8221; text_text_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8221;20px&#8221; header_2_font=&#8221;Inter|700|||||||&#8221; header_2_text_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8221;48px&#8221; header_2_line_height=&#8221;58px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||25px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; header_2_font_size_tablet=&#8221;48px&#8221; header_2_font_size_phone=&#8221;32px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_line_height_tablet=&#8221;58px&#8221; header_2_line_height_phone=&#8221;35px&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Want to know more?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; max_width=&#8221;1440px&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px|160px|70px|160px|false|true&#8221; custom_padding_tablet=&#8221;0px|160px|70px|160px|false|true&#8221; custom_padding_phone=&#8221;0px|0px|70px|0px|false|true&#8221; border_radii=&#8221;off|||15px|15px&#8221; box_shadow_style=&#8221;preset2&#8243; box_shadow_horizontal=&#8221;1px&#8221; box_shadow_vertical=&#8221;20px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMzNyJ9fQ==@&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;CONTACT US&#8221; button_alignment=&#8221;center&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.19.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#f18a00&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;3px&#8221; button_font=&#8221;Rubik||||||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;10px||10px||true|false&#8221; custom_padding=&#8221;12px||12px||true|true&#8221; custom_css_main_element=&#8221;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_bg_color%22%93}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9hdHRhY2htZW50Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjIzMTQ3In19@&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;DOWNLOAD PRESENTATION&#8221; button_alignment=&#8221;center&#8221; button_alignment_tablet=&#8221;center&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|phone&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.19.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#f18a00&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;3px&#8221; button_font=&#8221;Rubik||||||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;10px||10px||true|false&#8221; custom_padding=&#8221;12px||12px||true|true&#8221; custom_css_main_element=&#8221;width:230px;||min-width:230px;||max-width:230px;||text-align:center;&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_bg_color%22%93}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExMTgifX0=@&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;REQUEST DEMO&#8221; button_alignment=&#8221;center&#8221; button_alignment_tablet=&#8221;center&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;off|desktop&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.19.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;3px&#8221; button_font=&#8221;Rubik||||||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;10px||10px||true|false&#8221; custom_padding=&#8221;12px||12px||true|true&#8221; custom_css_main_element=&#8221;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_bg_color%22%93}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp&#8221; alt=&#8221;Want to know&#8221; title_text=&#8221;Want to know&#8221; align=&#8221;right&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; positioning=&#8221;absolute&#8221; position_origin_a=&#8221;bottom_right&#8221; vertical_offset=&#8221;-20px&#8221; horizontal_offset=&#8221;-100px&#8221; vertical_offset_tablet=&#8221;-20px&#8221; vertical_offset_phone=&#8221;-80px&#8221; vertical_offset_last_edited=&#8221;on|phone&#8221; horizontal_offset_tablet=&#8221;-100px&#8221; horizontal_offset_phone=&#8221;-130px&#8221; horizontal_offset_last_edited=&#8221;on|phone&#8221; width=&#8221;25%&#8221; width_tablet=&#8221;25%&#8221; width_phone=&#8221;25%&#8221; width_last_edited=&#8221;on|phone&#8221; custom_margin=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>First-level modulesSecurity Awareness Training \/ First-level modulesPHISHING is the most common attack technique used by cyber criminals. It is particularly underhand because it is based on a deception, which seeks to induce the potential victim to perform an action allowing the criminal to launch their attack. It is essential to recognise this in order to [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-24077","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>First-level modules - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Discover the list of modules for the first year of learning in the Cognitive Training Program of Cyber Guru Awareness\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-first-level-modules\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"First-level modules\" \/>\n<meta property=\"og:description\" content=\"Discover the list of modules for the first year of learning in the Cognitive Training Program of Cyber Guru Awareness\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-first-level-modules\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-09T08:28:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/cyber-guru-awareness-first-level-modules\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/cyber-guru-awareness-first-level-modules\\\/\",\"name\":\"First-level modules - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"datePublished\":\"2023-01-04T17:54:00+00:00\",\"dateModified\":\"2024-09-09T08:28:45+00:00\",\"description\":\"Discover the list of modules for the first year of learning in the Cognitive Training Program of Cyber Guru Awareness\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/cyber-guru-awareness-first-level-modules\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/cyber-guru-awareness-first-level-modules\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/cyber-guru-awareness-first-level-modules\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"First-level modules\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"First-level modules - Cyber Guru","description":"Discover the list of modules for the first year of learning in the Cognitive Training Program of Cyber Guru Awareness","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-first-level-modules\/","og_locale":"en_US","og_type":"article","og_title":"First-level modules","og_description":"Discover the list of modules for the first year of learning in the Cognitive Training Program of Cyber Guru Awareness","og_url":"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-first-level-modules\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2024-09-09T08:28:45+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-first-level-modules\/","url":"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-first-level-modules\/","name":"First-level modules - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"datePublished":"2023-01-04T17:54:00+00:00","dateModified":"2024-09-09T08:28:45+00:00","description":"Discover the list of modules for the first year of learning in the Cognitive Training Program of Cyber Guru Awareness","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-first-level-modules\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-first-level-modules\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/cyber-guru-awareness-first-level-modules\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"First-level modules"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/pages\/24077","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=24077"}],"version-history":[{"count":6,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/pages\/24077\/revisions"}],"predecessor-version":[{"id":39599,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/pages\/24077\/revisions\/39599"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=24077"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}