Cyber Security

$118.00

1000 in stock

SKU: 244-6-1 Categories: , ,

Description

[et_pb_section fb_built=”1″ _builder_version=”3.22″ custom_padding=”0px||||false|false”][et_pb_row _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” width=”100%” custom_padding=”0px||0px||false|false”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_wc_breadcrumb _builder_version=”3.0.47″][/et_pb_wc_breadcrumb][et_pb_wc_cart_notice _builder_version=”3.0.47″][/et_pb_wc_cart_notice][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” width=”100%” custom_padding=”0px||||false|false”][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https://www.pmtdi.com/wp-content/uploads/2019/11/female-scientist-white_53876-89029.jpg” _builder_version=”4.0.5″][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_wc_title _builder_version=”3.0.47″][/et_pb_wc_title][et_pb_wc_rating _builder_version=”3.0.47″][/et_pb_wc_rating][et_pb_wc_description _builder_version=”3.0.47″][/et_pb_wc_description][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” width=”100%”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.0.5″]

Every organization is responsible for ensuring cybersecurity. The ability to protect its information systems from impairment or even theft is essential to success. Implementing effective security measures will not only offer liability protection; it will also increase efficiency and productivity.

With our “Cybersecurity” course, your participants will discover the fundamentals of cybersecurity as well as the methods that should be implemented to make sure their computer systems are protected.

[/et_pb_text][et_pb_wc_upsells _builder_version=”3.0.47″][/et_pb_wc_upsells][et_pb_wc_price _builder_version=”3.0.47″ custom_padding=”||10px|||”][/et_pb_wc_price][et_pb_wc_add_to_cart _builder_version=”3.0.47″][/et_pb_wc_add_to_cart][et_pb_wc_meta _builder_version=”3.0.47″][/et_pb_wc_meta][et_pb_wc_related_products _builder_version=”3.0.47″][/et_pb_wc_related_products][/et_pb_column][/et_pb_row][/et_pb_section]