Courses

  • 1 Module

    Phishing

    Cyber criminals are intelligent individuals. They are notorious for hoodwinking even the savviest of CEOs and bigwigs from high-end organisations and governments all around the…
  • 1 Module

    Phishing

    Cyber criminals are intelligent individuals. They are notorious for hoodwinking even the savviest of CEOs and bigwigs from high-end organisations and governments all around the…
  • 2 Modules

    Phishing Awareness

    Outsmart cybercriminals at their own game

  • 1 Module

    Physical Security

    Cyber criminals never rest. They sleep with one eye open to continually find new ways to penetrate your home and workplace’s shields, working hard to…
  • 1 Module

    Physical Security

    Cyber criminals never rest. They sleep with one eye open to continually find new ways to penetrate your home and workplace’s shields, working hard to…
  • 0 Modules

    Public Sector Procurement

    By the end of this course, you will be able to:> Explain why the public sector has unique considerations> Summarise what frameworks are and when…
  • 0 Modules

    Read Me

    You have logged in with your justaftermidnight.com, which is not configured for use on Knowledge Lab. To get access, you will need to sign into…
  • 2 Modules

    Remote Working

    Protect yourself on-the-spot and on-the-move

  • 1 Module

    Security Essentials

    Great cyber security is the only thing that stands between us and the criminals on the internet. Without it, our personal data would be left…
  • 1 Module

    Security Essentials

    Great cyber security is the only thing that stands between us and the criminals on the internet. Without it, our personal data would be left…
  • 1 Module

    Security Essentials

    Great cyber security is the only thing that stands between us and the criminals on the internet. Without it, our personal data would be left…
  • 2 Modules

    Sharing Information Online

    Always share responsibly.

  • 3 Modules

    SMShing

    Protect your texts from crooks
  • 1 Module

    Social Engineering

    Social engineering is real, and no one is immune. The risks are alive and burning 24 hours a day, 365 days a year, whether you’re…
  • 1 Module

    Telephone Attacks

    Cyber criminals target using our most trusted form of communication: our phone. The technology behind telecommunications is open for exploitation – and cyber criminals know…
  • 1 Module

    Telephone Attacks

    Cyber criminals target using our most trusted form of communication: our phone. The technology behind telecommunications is open for exploitation – and cyber criminals know…
  • 2 Modules

    Vishing

    Social Engineering On-The-Fly

  • 8 Modules

    Welcome Onboard

    We’re thrilled that you’ve chosen us as your employer, you’re going to do great things. Great talent deserves a great stage – and being one…
  • 8 Modules

    Welcome Onboard

    We’re thrilled that you’ve chosen us as your employer, you’re going to do great things. Great talent deserves a great stage – and being one…
  • 8 Modules

    Welcome Onboard

    We’re thrilled that you’ve chosen us as your employer, you’re going to do great things. Great talent deserves a great stage – and being one…
  • 8 Modules

    Welcome Onboard

    We’re thrilled that you’ve chosen us as your employer, you’re going to do great things. Great talent deserves a great stage – and being one…
  • 0 Modules

    Workplace

    Respect lies at the heart of everything we do. We respect the dignity and worth of every individual, regardless of their background, identity, or position…