- Understand why MFA is essential and be able to log in using MFA independently.
- Password reuse is strictly forbidden.
Section 1: Introduction to Cyber Attacks
0/2
Section 2: Role-Based Responsibilities
0/3
Section 3: Attack-Specific Training
0/4
Section 4: Behaviour Training Goals
0/1
Expected Outcomes
Outcomes ecpected after compeleting this training module.
0/1
Mandatory Quiz
Time to test your understanding
0/1
