Social Engineering – Real-life Scenario
https://ecomsecurity.academy/wp-content/uploads/2020/08/SOCIAL-ENGINEERING_SCENERIO.mp4Read More
![Profile Photo](https://ecomsecurity.academy/wp-content/uploads/avatars/12/5f3c072f6b6d9-bpthumb.jpg)
Remote Access Security Risks – Real-life Scenario
https://ecomsecurity.academy/wp-content/uploads/2020/08/remote-access-risks.mp4Read More
![Profile Photo](https://ecomsecurity.academy/wp-content/uploads/avatars/12/5f3c072f6b6d9-bpthumb.jpg)
Email Phishing – Real-life Scenario
https://ecomsecurity.academy/wp-content/uploads/2020/08/EMail-Phishing-Scenerio.mp4Read More
![Profile Photo](https://ecomsecurity.academy/wp-content/uploads/avatars/11/5f3acc24d25f1-bpthumb.jpg)
Disaster Recovery – Best Practices
https://ecomsecurity.academy/wp-content/uploads/2020/08/Disaster-Recovery.mp4Read More
![Profile Photo](https://ecomsecurity.academy/wp-content/uploads/avatars/14/5f3c09f6e2bca-bpthumb.jpg)
Security and Digital Collaboration – Best Practices
https://ecomsecurity.academy/wp-content/uploads/2021/05/Security%20and%20Digital%20Collaboration.mp4Read More
![Profile Photo](https://ecomsecurity.academy/wp-content/uploads/avatars/11/5f3acc24d25f1-bpthumb.jpg)
Computer and Hardware – Policies
https://ecomsecurity.academy/wp-content/uploads/2020/08/COMPUTER-AND-HARDWARE-POLICIES.mp4Read More
![Profile Photo](https://ecomsecurity.academy/wp-content/uploads/avatars/12/5f3c072f6b6d9-bpthumb.jpg)