We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

Deepfake Detection and Defense

Unmasking Cyber Deception in a Tabletop Simulation

Martin Peters and Phillip Davies lead an interactive tabletop simulation of a deepfake-driven cyberattack, focusing on organizational readiness and response strategies.

Price
Course duration Duration: 20 minutes

AI's Influence on Cyber Deception and Deepfakes

Prof. D Janakiram from IIT Madras explores AI-powered defense mechanisms against deepfakes, covering threat patterns, detection techniques, and multi-layered security approaches.

Price
Course duration Duration: 15 minutes

BEC Attacks: Detection and Response

Business email compromise (BEC) attacks are increasingly used by attackers as a way of targeting organizations. According to Gartner, through 2023, BEC attacks will continue to double each year to over $5 billion and lead to large financial losses for enterprises.

Price
Course duration Duration: 30 minutes

Build Secure LLMs with the OWASP Top 10

Explore the OWASP Top 10 for LLM Applications!

Price
Course duration Duration: 30 minutes

Generative AI Exposed

Recognize and prevent AI-driven cyber threats before they strike. Stay one step ahead—stay informed, stay secure!

Price
Course duration Duration: 20 minutes

Protecting Patient Trust

Sumant Mauskar of Pindrop covers multifactor voice authentication frameworks, device fingerprinting, synthetic voice detection, real-time fraud detection and ROI analysis for healthcare contact centers.

Price
Course duration Duration: 25 minutes

Securing Against Deepfakes, Agentic AI, & Quantum

Tony Fergusson of Zscaler examines why zero trust must evolve to verify data authenticity in deepfake era and how adversaries exploit trusted platforms and use prompt injection to evade AI detection.

Contact us
Course duration Duration: 30 minutes
Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement