{"id":2951,"date":"2025-05-16T04:21:14","date_gmt":"2025-05-16T04:21:14","guid":{"rendered":"https:\/\/consultancyinspire.com\/?page_id=2951"},"modified":"2025-05-16T04:32:24","modified_gmt":"2025-05-16T04:32:24","slug":"cybersecurity-fundamentals","status":"publish","type":"page","link":"https:\/\/consultancyinspire.com\/km\/cybersecurity-fundamentals\/","title":{"rendered":"Cybersecurity Fundamentals"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"2951\" class=\"elementor elementor-2951\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bacbcd4 e-flex e-con-boxed e-con e-parent\" data-id=\"bacbcd4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8e10577 elementor-widget elementor-widget-heading\" data-id=\"8e10577\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ep_threed_text_active&quot;:&quot;yes&quot;,&quot;ep_threed_text_depth&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;ep_threed_text_layers&quot;:1,&quot;ep_threed_text_event&quot;:&quot;pointer&quot;,&quot;ep_threed_text_event_rotation&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]},&quot;ep_threed_text_perspective&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:500,&quot;sizes&quot;:[]},&quot;ep_threed_text_fade&quot;:&quot;yes&quot;,&quot;ep_threed_text_event_direction&quot;:&quot;default&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Fundamentals<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e338b7b e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"e338b7b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3e655ad e-con-full e-flex e-con e-child\" data-id=\"3e655ad\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-3792a3d e-con-full e-flex e-con e-child\" data-id=\"3792a3d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-033a521 elementor-widget elementor-widget-image\" data-id=\"033a521\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"513\" src=\"https:\/\/consultancyinspire.com\/wp-content\/uploads\/2025\/05\/pexels-photo-1181263-1181263-768x513.jpg\" class=\"attachment-medium_large size-medium_large wp-image-1981\" alt=\"Two women working together on software programming indoors, focusing on code.\" srcset=\"https:\/\/consultancyinspire.com\/wp-content\/uploads\/2025\/05\/pexels-photo-1181263-1181263-768x513.jpg 768w, https:\/\/consultancyinspire.com\/wp-content\/uploads\/2025\/05\/pexels-photo-1181263-1181263-300x200.jpg 300w, https:\/\/consultancyinspire.com\/wp-content\/uploads\/2025\/05\/pexels-photo-1181263-1181263-1024x684.jpg 1024w, https:\/\/consultancyinspire.com\/wp-content\/uploads\/2025\/05\/pexels-photo-1181263-1181263-1536x1025.jpg 1536w, https:\/\/consultancyinspire.com\/wp-content\/uploads\/2025\/05\/pexels-photo-1181263-1181263-2048x1367.jpg 2048w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b6698b0 e-con-full e-flex e-con e-child\" data-id=\"b6698b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fbeb989 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"fbeb989\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Protect Your Data. Secure Your Business. Build Digital Confidence.<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-598f642 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"598f642\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"262\" data-end=\"496\"><span class=\"_fadeIn_m1hgl_8\">Cyberattacks <\/span><span class=\"_fadeIn_m1hgl_8\">can <\/span><span class=\"_fadeIn_m1hgl_8\">happen <\/span><span class=\"_fadeIn_m1hgl_8\">to <\/span><span class=\"_fadeIn_m1hgl_8\">any <\/span><span class=\"_fadeIn_m1hgl_8\">business \u2014 <\/span><span class=\"_fadeIn_m1hgl_8\">large <\/span><span class=\"_fadeIn_m1hgl_8\">or <\/span><span class=\"_fadeIn_m1hgl_8\">small. <\/span><span class=\"_fadeIn_m1hgl_8\">This <\/span><span class=\"_fadeIn_m1hgl_8\">foundational <\/span><span class=\"_fadeIn_m1hgl_8\">course <\/span><span class=\"_fadeIn_m1hgl_8\">in <\/span><span class=\"_fadeIn_m1hgl_8\">cybersecurity <\/span><span class=\"_fadeIn_m1hgl_8\">empowers <\/span><span class=\"_fadeIn_m1hgl_8\">individuals <\/span><span class=\"_fadeIn_m1hgl_8\">and <\/span><span class=\"_fadeIn_m1hgl_8\">organizations <\/span><span class=\"_fadeIn_m1hgl_8\">to <\/span><span class=\"_fadeIn_m1hgl_8\">defend <\/span><span class=\"_fadeIn_m1hgl_8\">against <\/span><span class=\"_fadeIn_m1hgl_8\">threats, <\/span><span class=\"_fadeIn_m1hgl_8\">protect <\/span><span class=\"_fadeIn_m1hgl_8\">sensitive <\/span><span class=\"_fadeIn_m1hgl_8\">information, <\/span><span class=\"_fadeIn_m1hgl_8\">and <\/span><span class=\"_fadeIn_m1hgl_8\">build <\/span><span class=\"_fadeIn_m1hgl_8\">safer <\/span><span class=\"_fadeIn_m1hgl_8\">digital <\/span><span class=\"_fadeIn_m1hgl_8\">environments.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20a76f0 elementor-align-left elementor-mobile-align-left elementor-invisible elementor-widget elementor-widget-button\" data-id=\"20a76f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:0}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-bounce-in\" href=\"https:\/\/www.facebook.com\/Camkpi.Info\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Register<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-adddb20 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"adddb20\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e24e738 elementor-widget elementor-widget-text-editor\" data-id=\"e24e738\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"503\" data-end=\"544\"><span class=\"_fadeIn_m1hgl_8\">\ud83d\udd12 <\/span><strong data-start=\"510\" data-end=\"544\"><span class=\"_fadeIn_m1hgl_8\">Why <\/span><span class=\"_fadeIn_m1hgl_8\">Cybersecurity <\/span><span class=\"_fadeIn_m1hgl_8\">is <\/span><span class=\"_fadeIn_m1hgl_8\">Essential<\/span><\/strong><\/p><p data-start=\"546\" data-end=\"773\"><span class=\"_fadeIn_m1hgl_8\">With <\/span><span class=\"_fadeIn_m1hgl_8\">increasing <\/span><span class=\"_fadeIn_m1hgl_8\">reliance <\/span><span class=\"_fadeIn_m1hgl_8\">on <\/span><span class=\"_fadeIn_m1hgl_8\">technology, <\/span><span class=\"_fadeIn_m1hgl_8\">the <\/span><span class=\"_fadeIn_m1hgl_8\">risk <\/span><span class=\"_fadeIn_m1hgl_8\">of <\/span><span class=\"_fadeIn_m1hgl_8\">cyber <\/span><span class=\"_fadeIn_m1hgl_8\">threats <\/span><span class=\"_fadeIn_m1hgl_8\">is <\/span><span class=\"_fadeIn_m1hgl_8\">higher <\/span><span class=\"_fadeIn_m1hgl_8\">than <\/span><span class=\"_fadeIn_m1hgl_8\">ever. <\/span><span class=\"_fadeIn_m1hgl_8\">Whether <\/span><span class=\"_fadeIn_m1hgl_8\">it\u2019s <\/span><span class=\"_fadeIn_m1hgl_8\">ransomware, <\/span><span class=\"_fadeIn_m1hgl_8\">phishing, <\/span><span class=\"_fadeIn_m1hgl_8\">or <\/span><span class=\"_fadeIn_m1hgl_8\">data <\/span><span class=\"_fadeIn_m1hgl_8\">breaches, <\/span><span class=\"_fadeIn_m1hgl_8\">this <\/span><span class=\"_fadeIn_m1hgl_8\">course <\/span><span class=\"_fadeIn_m1hgl_8\">helps <\/span><span class=\"_fadeIn_m1hgl_8\">you <\/span><span class=\"_fadeIn_m1hgl_8\">recognize <\/span><span class=\"_fadeIn_m1hgl_8\">and <\/span><span class=\"_fadeIn_m1hgl_8\">respond <\/span><span class=\"_fadeIn_m1hgl_8\">to <\/span><span class=\"_fadeIn_m1hgl_8\">security <\/span><span class=\"_fadeIn_m1hgl_8\">risks <\/span><span class=\"_fadeIn_m1hgl_8\">before <\/span><span class=\"_fadeIn_m1hgl_8\">they <\/span><span class=\"_fadeIn_m1hgl_8\">cause <\/span><span class=\"_fadeIn_m1hgl_8\">damage.<\/span><\/p><p data-start=\"546\" data-end=\"773\">\u00a0<\/p><p data-start=\"780\" data-end=\"805\"><span class=\"_fadeIn_m1hgl_8\">\ud83e\udde0 <\/span><strong data-start=\"787\" data-end=\"805\"><span class=\"_fadeIn_m1hgl_8\">Course <\/span><span class=\"_fadeIn_m1hgl_8\">Modules<\/span><\/strong><\/p><ol data-start=\"807\" data-end=\"1617\"><li data-start=\"807\" data-end=\"942\"><p data-start=\"810\" data-end=\"942\"><strong data-start=\"810\" data-end=\"843\"><span class=\"_fadeIn_m1hgl_8\">Introduction <\/span><span class=\"_fadeIn_m1hgl_8\">to <\/span><span class=\"_fadeIn_m1hgl_8\">Cybersecurity<\/span><\/strong><br data-start=\"843\" data-end=\"846\" \/><span class=\"_fadeIn_m1hgl_8\">Understand <\/span><span class=\"_fadeIn_m1hgl_8\">the <\/span><span class=\"_fadeIn_m1hgl_8\">core <\/span><span class=\"_fadeIn_m1hgl_8\">concepts: <\/span><span class=\"_fadeIn_m1hgl_8\">threats, <\/span><span class=\"_fadeIn_m1hgl_8\">vulnerabilities, <\/span><span class=\"_fadeIn_m1hgl_8\">risks, <\/span><span class=\"_fadeIn_m1hgl_8\">and <\/span><span class=\"_fadeIn_m1hgl_8\">basic <\/span><span class=\"_fadeIn_m1hgl_8\">security <\/span><span class=\"_fadeIn_m1hgl_8\">principles.<\/span><\/p><\/li><li data-start=\"944\" data-end=\"1064\"><p data-start=\"947\" data-end=\"1064\"><strong data-start=\"947\" data-end=\"980\"><span class=\"_fadeIn_m1hgl_8\">Common <\/span><span class=\"_fadeIn_m1hgl_8\">Types <\/span><span class=\"_fadeIn_m1hgl_8\">of <\/span><span class=\"_fadeIn_m1hgl_8\">Cyber <\/span><span class=\"_fadeIn_m1hgl_8\">Threats<\/span><\/strong><br data-start=\"980\" data-end=\"983\" \/><span class=\"_fadeIn_m1hgl_8\">Learn <\/span><span class=\"_fadeIn_m1hgl_8\">about <\/span><span class=\"_fadeIn_m1hgl_8\">malware, <\/span><span class=\"_fadeIn_m1hgl_8\">phishing, <\/span><span class=\"_fadeIn_m1hgl_8\">social <\/span><span class=\"_fadeIn_m1hgl_8\">engineering, <\/span><span class=\"_fadeIn_m1hgl_8\">password <\/span><span class=\"_fadeIn_m1hgl_8\">attacks, <\/span><span class=\"_fadeIn_m1hgl_8\">and <\/span><span class=\"_fadeIn_m1hgl_8\">more.<\/span><\/p><\/li><li data-start=\"1066\" data-end=\"1190\"><p data-start=\"1069\" data-end=\"1190\"><strong data-start=\"1069\" data-end=\"1101\"><span class=\"_fadeIn_m1hgl_8\">Protecting <\/span><span class=\"_fadeIn_m1hgl_8\">Systems &amp; <\/span><span class=\"_fadeIn_m1hgl_8\">Devices<\/span><\/strong><br data-start=\"1101\" data-end=\"1104\" \/><span class=\"_fadeIn_m1hgl_8\">Explore <\/span><span class=\"_fadeIn_m1hgl_8\">antivirus <\/span><span class=\"_fadeIn_m1hgl_8\">tools, <\/span><span class=\"_fadeIn_m1hgl_8\">firewalls, <\/span><span class=\"_fadeIn_m1hgl_8\">secure <\/span><span class=\"_fadeIn_m1hgl_8\">configurations, <\/span><span class=\"_fadeIn_m1hgl_8\">and <\/span><span class=\"_fadeIn_m1hgl_8\">endpoint <\/span><span class=\"_fadeIn_m1hgl_8\">protection.<\/span><\/p><\/li><li data-start=\"1192\" data-end=\"1318\"><p data-start=\"1195\" data-end=\"1318\"><strong data-start=\"1195\" data-end=\"1224\"><span class=\"_fadeIn_m1hgl_8\">Data <\/span><span class=\"_fadeIn_m1hgl_8\">Protection &amp; <\/span><span class=\"_fadeIn_m1hgl_8\">Privacy<\/span><\/strong><br data-start=\"1224\" data-end=\"1227\" \/><span class=\"_fadeIn_m1hgl_8\">Learn <\/span><span class=\"_fadeIn_m1hgl_8\">how <\/span><span class=\"_fadeIn_m1hgl_8\">to <\/span><span class=\"_fadeIn_m1hgl_8\">secure <\/span><span class=\"_fadeIn_m1hgl_8\">personal <\/span><span class=\"_fadeIn_m1hgl_8\">and <\/span><span class=\"_fadeIn_m1hgl_8\">business <\/span><span class=\"_fadeIn_m1hgl_8\">data, <\/span><span class=\"_fadeIn_m1hgl_8\">including <\/span><span class=\"_fadeIn_m1hgl_8\">encryption <\/span><span class=\"_fadeIn_m1hgl_8\">and <\/span><span class=\"_fadeIn_m1hgl_8\">secure <\/span><span class=\"_fadeIn_m1hgl_8\">backups.<\/span><\/p><\/li><li data-start=\"1320\" data-end=\"1479\"><p data-start=\"1323\" data-end=\"1479\"><strong data-start=\"1323\" data-end=\"1357\"><span class=\"_fadeIn_m1hgl_8\">Cyber <\/span><span class=\"_fadeIn_m1hgl_8\">Hygiene &amp; <\/span><span class=\"_fadeIn_m1hgl_8\">Safe <\/span><span class=\"_fadeIn_m1hgl_8\">Practices<\/span><\/strong><br data-start=\"1357\" data-end=\"1360\" \/><span class=\"_fadeIn_m1hgl_8\">Build <\/span><span class=\"_fadeIn_m1hgl_8\">a <\/span><span class=\"_fadeIn_m1hgl_8\">culture <\/span><span class=\"_fadeIn_m1hgl_8\">of <\/span><span class=\"_fadeIn_m1hgl_8\">awareness <\/span><span class=\"_fadeIn_m1hgl_8\">through <\/span><span class=\"_fadeIn_m1hgl_8\">password <\/span><span class=\"_fadeIn_m1hgl_8\">policies, <\/span><span class=\"_fadeIn_m1hgl_8\">multi-<\/span><span class=\"_fadeIn_m1hgl_8\">factor <\/span><span class=\"_fadeIn_m1hgl_8\">authentication (<\/span><span class=\"_fadeIn_m1hgl_8\">MFA), <\/span><span class=\"_fadeIn_m1hgl_8\">and <\/span><span class=\"_fadeIn_m1hgl_8\">safe <\/span><span class=\"_fadeIn_m1hgl_8\">browsing <\/span><span class=\"_fadeIn_m1hgl_8\">habits.<\/span><\/p><\/li><li data-start=\"1481\" data-end=\"1617\"><p data-start=\"1484\" data-end=\"1617\"><strong data-start=\"1484\" data-end=\"1516\"><span class=\"_fadeIn_m1hgl_8\">Incident <\/span><span class=\"_fadeIn_m1hgl_8\">Response &amp; <\/span><span class=\"_fadeIn_m1hgl_8\">Recovery<\/span><\/strong><br data-start=\"1516\" data-end=\"1519\" \/><span class=\"_fadeIn_m1hgl_8\">Develop <\/span><span class=\"_fadeIn_m1hgl_8\">basic <\/span><span class=\"_fadeIn_m1hgl_8\">response <\/span><span class=\"_fadeIn_m1hgl_8\">steps <\/span><span class=\"_fadeIn_m1hgl_8\">when <\/span><span class=\"_fadeIn_m1hgl_8\">an <\/span><span class=\"_fadeIn_m1hgl_8\">attack <\/span><span class=\"_fadeIn_m1hgl_8\">occurs <\/span><span class=\"_fadeIn_m1hgl_8\">and <\/span><span class=\"_fadeIn_m1hgl_8\">understand <\/span><span class=\"_fadeIn_m1hgl_8\">business <\/span><span class=\"_fadeIn_m1hgl_8\">continuity <\/span><span class=\"_fadeIn_m1hgl_8\">planning.<\/span><\/p><\/li><\/ol><p>\u00a0<\/p><p data-start=\"1624\" data-end=\"1652\"><span class=\"_fadeIn_m1hgl_8\">\ud83d\udc65 <\/span><strong data-start=\"1631\" data-end=\"1652\"><span class=\"_fadeIn_m1hgl_8\">Who <\/span><span class=\"_fadeIn_m1hgl_8\">Should <\/span><span class=\"_fadeIn_m1hgl_8\">Attend<\/span><\/strong><\/p><ul data-start=\"1654\" data-end=\"1828\"><li data-start=\"1654\" data-end=\"1684\"><p data-start=\"1656\" data-end=\"1684\"><span class=\"_fadeIn_m1hgl_8\">Business <\/span><span class=\"_fadeIn_m1hgl_8\">Owners &amp; <\/span><span class=\"_fadeIn_m1hgl_8\">Managers<\/span><\/p><\/li><li data-start=\"1685\" data-end=\"1732\"><p data-start=\"1687\" data-end=\"1732\"><span class=\"_fadeIn_m1hgl_8\">HR\/<\/span><span class=\"_fadeIn_m1hgl_8\">Admin\/<\/span><span class=\"_fadeIn_m1hgl_8\">Finance <\/span><span class=\"_fadeIn_m1hgl_8\">Staff <\/span><span class=\"_fadeIn_m1hgl_8\">using <\/span><span class=\"_fadeIn_m1hgl_8\">online <\/span><span class=\"_fadeIn_m1hgl_8\">systems<\/span><\/p><\/li><li data-start=\"1733\" data-end=\"1771\"><p data-start=\"1735\" data-end=\"1771\"><span class=\"_fadeIn_m1hgl_8\">IT <\/span><span class=\"_fadeIn_m1hgl_8\">Support <\/span><span class=\"_fadeIn_m1hgl_8\">or <\/span><span class=\"_fadeIn_m1hgl_8\">Non-<\/span><span class=\"_fadeIn_m1hgl_8\">IT <\/span><span class=\"_fadeIn_m1hgl_8\">Professionals<\/span><\/p><\/li><li data-start=\"1772\" data-end=\"1828\"><p data-start=\"1774\" data-end=\"1828\"><span class=\"_fadeIn_m1hgl_8\">Anyone <\/span><span class=\"_fadeIn_m1hgl_8\">interested <\/span><span class=\"_fadeIn_m1hgl_8\">in <\/span><span class=\"_fadeIn_m1hgl_8\">improving <\/span><span class=\"_fadeIn_m1hgl_8\">cybersecurity <\/span><span class=\"_fadeIn_m1hgl_8\">awareness<\/span><\/p><\/li><\/ul><p>\u00a0<\/p><p data-start=\"1835\" data-end=\"1857\"><span class=\"_fadeIn_m1hgl_8\">\u2705 <\/span><strong data-start=\"1841\" data-end=\"1857\"><span class=\"_fadeIn_m1hgl_8\">Key <\/span><span class=\"_fadeIn_m1hgl_8\">Outcomes<\/span><\/strong><\/p><ul data-start=\"1859\" data-end=\"2129\"><li data-start=\"1859\" data-end=\"1921\"><p data-start=\"1861\" data-end=\"1921\"><span class=\"_fadeIn_m1hgl_8\">Ability <\/span><span class=\"_fadeIn_m1hgl_8\">to <\/span><span class=\"_fadeIn_m1hgl_8\">identify <\/span><span class=\"_fadeIn_m1hgl_8\">cyber <\/span><span class=\"_fadeIn_m1hgl_8\">risks <\/span><span class=\"_fadeIn_m1hgl_8\">and <\/span><span class=\"_fadeIn_m1hgl_8\">prevent <\/span><span class=\"_fadeIn_m1hgl_8\">common <\/span><span class=\"_fadeIn_m1hgl_8\">attacks<\/span><\/p><\/li><li data-start=\"1922\" data-end=\"1984\"><p data-start=\"1924\" data-end=\"1984\"><span class=\"_fadeIn_m1hgl_8\">Knowledge <\/span><span class=\"_fadeIn_m1hgl_8\">of <\/span><span class=\"_fadeIn_m1hgl_8\">tools <\/span><span class=\"_fadeIn_m1hgl_8\">to <\/span><span class=\"_fadeIn_m1hgl_8\">secure <\/span><span class=\"_fadeIn_m1hgl_8\">networks, <\/span><span class=\"_fadeIn_m1hgl_8\">emails, <\/span><span class=\"_fadeIn_m1hgl_8\">and <\/span><span class=\"_fadeIn_m1hgl_8\">systems<\/span><\/p><\/li><li data-start=\"1985\" data-end=\"2045\"><p data-start=\"1987\" data-end=\"2045\"><span class=\"_fadeIn_m1hgl_8\">Stronger <\/span><span class=\"_fadeIn_m1hgl_8\">internal <\/span><span class=\"_fadeIn_m1hgl_8\">policies <\/span><span class=\"_fadeIn_m1hgl_8\">and <\/span><span class=\"_fadeIn_m1hgl_8\">awareness <\/span><span class=\"_fadeIn_m1hgl_8\">among <\/span><span class=\"_fadeIn_m1hgl_8\">your <\/span><span class=\"_fadeIn_m1hgl_8\">team<\/span><\/p><\/li><li data-start=\"2046\" data-end=\"2097\"><p data-start=\"2048\" data-end=\"2097\"><span class=\"_fadeIn_m1hgl_8\">A <\/span><span class=\"_fadeIn_m1hgl_8\">safer, <\/span><span class=\"_fadeIn_m1hgl_8\">more <\/span><span class=\"_fadeIn_m1hgl_8\">resilient <\/span><span class=\"_fadeIn_m1hgl_8\">business <\/span><span class=\"_fadeIn_m1hgl_8\">IT <\/span><span class=\"_fadeIn_m1hgl_8\">environment<\/span><\/p><\/li><li data-start=\"2098\" data-end=\"2129\"><p data-start=\"2100\" data-end=\"2129\"><strong data-start=\"2100\" data-end=\"2129\"><span class=\"_fadeIn_m1hgl_8\">Certificate <\/span><span class=\"_fadeIn_m1hgl_8\">of <\/span><span class=\"_fadeIn_m1hgl_8\">Completion<\/span><\/strong><\/p><\/li><\/ul><p>\u00a0<\/p><p data-start=\"2136\" data-end=\"2324\"><span class=\"_fadeIn_m1hgl_8\">\ud83d\uddd3\ufe0f <\/span><strong data-start=\"2140\" data-end=\"2157\"><span class=\"_fadeIn_m1hgl_8\">Next <\/span><span class=\"_fadeIn_m1hgl_8\">Session:<\/span><\/strong><span class=\"_fadeIn_m1hgl_8\"> [<\/span><span class=\"_fadeIn_m1hgl_8\">Insert <\/span><span class=\"_fadeIn_m1hgl_8\">Date]<\/span><br data-start=\"2171\" data-end=\"2174\" \/><span class=\"_fadeIn_m1hgl_8\">\u23f1\ufe0f <\/span><strong data-start=\"2177\" data-end=\"2190\"><span class=\"_fadeIn_m1hgl_8\">Duration:<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">1 <\/span><span class=\"_fadeIn_m1hgl_8\">Day (<\/span><span class=\"_fadeIn_m1hgl_8\">Essentials) \/ <\/span><span class=\"_fadeIn_m1hgl_8\">2 <\/span><span class=\"_fadeIn_m1hgl_8\">Days (<\/span><span class=\"_fadeIn_m1hgl_8\">Advanced)<\/span><br data-start=\"2229\" data-end=\"2232\" \/><span class=\"_fadeIn_m1hgl_8\">\ud83d\udccd <\/span><strong data-start=\"2235\" data-end=\"2248\"><span class=\"_fadeIn_m1hgl_8\">Location:<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">Online <\/span><span class=\"_fadeIn_m1hgl_8\">or <\/span><span class=\"_fadeIn_m1hgl_8\">In-<\/span><span class=\"_fadeIn_m1hgl_8\">Person (<\/span><span class=\"_fadeIn_m1hgl_8\">Phnom <\/span><span class=\"_fadeIn_m1hgl_8\">Penh)<\/span><br data-start=\"2281\" data-end=\"2284\" \/><span class=\"_fadeIn_m1hgl_8\">\ud83d\udcdc <\/span><strong data-start=\"2287\" data-end=\"2300\"><span class=\"_fadeIn_m1hgl_8\">Language:<\/span><\/strong> <span class=\"_fadeIn_m1hgl_8\">English &amp; <\/span><span class=\"_fadeIn_m1hgl_8\">Khmer <\/span><span class=\"_fadeIn_m1hgl_8\">options<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f57efda e-flex e-con-boxed e-con e-parent\" data-id=\"f57efda\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f562d18 e-con-full e-flex e-con e-child\" data-id=\"f562d18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d5f98f elementor-align-right elementor-mobile-align-right elementor-invisible elementor-widget elementor-widget-button\" data-id=\"7d5f98f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:0}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-bounce-in\" href=\"https:\/\/consultancyinspire.com\/km\/outsourcing-service\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">&lt; Previous<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7d880de e-con-full e-flex e-con e-child\" data-id=\"7d880de\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa2e79f elementor-align-left elementor-mobile-align-left elementor-invisible elementor-widget elementor-widget-button\" data-id=\"fa2e79f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:0}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-bounce-in\" href=\"https:\/\/consultancyinspire.com\/km\/hr-essentials-people-and-processes\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Next &gt;<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Fundamentals Protect Your Data. Secure Your Business. Build Digital Confidence. Cyberattacks can happen to any business \u2014 large or small. This foundational course in cybersecurity empowers individuals and organizations to defend against threats, protect sensitive information, and build safer digital environments. Register \ud83d\udd12 Why Cybersecurity is Essential With increasing reliance on technology, the risk [&hellip;]<\/p>","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-2951","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"Devit Nov","author_link":"https:\/\/consultancyinspire.com\/km\/author\/dvit73561gmail-com\/"},"uagb_comment_info":0,"uagb_excerpt":"Cybersecurity Fundamentals Protect Your Data. Secure Your Business. Build Digital Confidence. Cyberattacks can happen to any business \u2014 large or small. This foundational course in cybersecurity empowers individuals and organizations to defend against threats, protect sensitive information, and build safer digital environments. Register \ud83d\udd12 Why Cybersecurity is Essential With increasing reliance on technology, the risk&hellip;","rttpg_featured_image_url":null,"rttpg_author":{"display_name":"Devit Nov","author_link":"https:\/\/consultancyinspire.com\/km\/author\/dvit73561gmail-com\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"Cybersecurity Fundamentals Protect Your Data. Secure Your Business. Build Digital Confidence. Cyberattacks can happen to any business \u2014 large or small. This foundational course in cybersecurity empowers individuals and organizations to defend against threats, protect sensitive information, and build safer digital environments. Register \ud83d\udd12 Why Cybersecurity is Essential With increasing reliance on technology, the risk&hellip;","_links":{"self":[{"href":"https:\/\/consultancyinspire.com\/km\/wp-json\/wp\/v2\/pages\/2951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/consultancyinspire.com\/km\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/consultancyinspire.com\/km\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/consultancyinspire.com\/km\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/consultancyinspire.com\/km\/wp-json\/wp\/v2\/comments?post=2951"}],"version-history":[{"count":7,"href":"https:\/\/consultancyinspire.com\/km\/wp-json\/wp\/v2\/pages\/2951\/revisions"}],"predecessor-version":[{"id":2961,"href":"https:\/\/consultancyinspire.com\/km\/wp-json\/wp\/v2\/pages\/2951\/revisions\/2961"}],"wp:attachment":[{"href":"https:\/\/consultancyinspire.com\/km\/wp-json\/wp\/v2\/media?parent=2951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}