Accreditations and Endorsements
![CPD certified](https://lpshowcase.learningpool.com/wp-content/uploads/2021/07/cpd-certified-black-150x137.png)
![](https://lpshowcase.learningpool.com/wp-content/uploads/2022/10/Crown-150x124.png)
Welcome to Audio Learning from Assemble You.
Hackers conduct cyber attacks to steal information, sabotage one or more systems, or bring down a working network. They can also attack several systems at once, gain control, and use these systems to initiate another attack on a different network altogether.
In this track, we’ll learn about social engineering, malware, ransomware, distributed denial of service, Man-in-the-middle (MITM) attacks, insider threats, credential reuse, and mobile attacks.
Watch Content PreviewWelcome to Audio Learning from Assemble You. Today we are discussing using and managing passwords. Your house often contains the most valuable possessions you […]
Welcome to Audio Learning from Assemble You. In his book How to Hack a Human: Cybersecurity for the Mind, security expert Raef Meeuwisse defines […]
Welcome to Audio Learning from Assemble You. Malware is a portmanteau, a combination of the words – “malicious” and “software.” It’s malicious software that […]
Welcome to Audio Learning from Assemble You. In this track, we’ll discuss cultural awareness, and discover how being culturally aware enables us to communicate […]
Welcome to Audio Learning from Assemble You. In this track, we’ll discuss banter and bullying. We’ll pin down the definitions before highlighting the line […]
Welcome to Audio Learning from Assemble You. In this track, we’ll discuss unconscious and implicit bias. We’ll learn what these terms mean, how they […]
Welcome to Audio Learning from Assemble You. In this track, you’ll improve your understanding of equality, diversity, and inclusion. You’ll identify areas in which […]
"*" indicates required fields
Products that work beautifully on their own and seamlessly when you put them together