-
Interactive presentations
4-
Cybersecurity challenges and opportunitiesLecture1.1
-
Methods for securing computers, mobile devices and networksLecture1.2
-
Cybersecurity tools and applicationsLecture1.3
-
Best practices for cybersecurityLecture1.4
-
-
Post presentations session
3-
Study casesLecture2.1
-
Questions & AnswersLecture2.2
-
Final conclusionsLecture2.3
-
Methods for securing computers, mobile devices and networks
Lesson content is empty.
