• Meet the Hacker CT
    • Meet the Hacker CT
    • Meet the Hacker CT
    • IS YOUR COMPANY CYBERSAFE? Join us for a guided tour from an attacker’s perspective: how employees are used to bypass a company’s security controls and gain access to secure / confidential resources. We will also go through the most prevalent methods to gain access through social engineering. When you complete the course, you will receive a Cyber Academy Certificate from…
    • Read more
  • Meet the Hacker DBN
    • Meet the Hacker DBN
    • Meet the Hacker DBN
    • IS YOUR COMPANY CYBER SAFE? Join us for a guided tour from an attacker’s perspective: how employees are used to bypass a company’s security controls and gain access to secure / confidential resources. We will also go through the most prevalent methods to gain access through social engineering. When you complete the course, you will receive a Cyber Academy Certificate…
    • Read more
  • Meet the Hacker JHB
    • Meet the Hacker JHB
    • Meet the Hacker JHB
    • IS YOUR COMPANY CYBERSAFE? Join us for a guided tour from an attacker’s perspective: how employees are used to bypass a company’s security controls and gain access to secure / confidential resources. We will also go through the most prevalent methods to gain access through social engineering. When you complete the course, you will receive a Cyber Academy Certificate from…
    • Read more
  • Meet the Hacker PE
    • Meet the Hacker PE
    • Meet the Hacker PE
    • IS YOUR COMPANY CYBER SAFE? Join us for a guided tour from an attacker’s perspective: how employees are used to bypass a company’s security controls and gain access to secure / confidential resources. We will also go through the most prevalent methods to gain access through social engineering. When you complete the course, you will receive a Cyber Academy Certificate…
    • Read more
  • Meet the Hacker PTA
    • Meet the Hacker PTA
    • Meet the Hacker PTA
    • IS YOUR COMPANY CYBERSAFE? Join us for a guided tour from an attacker’s perspective: how employees are used to bypass a company’s security controls and gain access to secure / confidential resources. We will also go through the most prevalent methods to gain access through social engineering. When you complete the course, you will receive a Cyber Academy Certificate from…
    • Read more
  • Meet the Hacker PTA (Cyber Warfare)
    • Meet the Hacker PTA (Cyber Warfare)
    • Meet the Hacker PTA (Cyber Warfare)
    • IS YOUR COMPANY CYBERSAFE? Join us for a guided tour from an attacker’s perspective: how employees are used to bypass a company’s security controls and gain access to secure / confidential resources. We will also go through the most prevalent methods to gain access through social engineering. When you complete the course, you will receive a Cyber Academy Certificate from…
    • Read more
  • Meet the Hacker CT1
    • Meet the Hacker CT1
    • Meet the Hacker CT1
    • IS YOUR COMPANY CYBER SAFE? Join us for a guided tour from an attacker’s perspective: how employees are used to bypass a company’s security controls and gain access to secure / confidential resources. We will also go through the most prevalent methods to gain access through social engineering. When you complete the course, you will receive a Cyber Academy Certificate…
    • Read more
Close Menu
0
×

Cart