We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About CyberEd.io
    Who We AreOur ValuesChallenges We Solve
    Community
    Information Security Media GroupCyberEdBoardAdvisory Board
    Innovation
    Our MethodologyAI-Powered TrainingEnterprise Integration
  • Training Solutions
    On-Demand
    Security Insights LibraryIndustry-BasedRole-BasedMasterclasses
    Hands-On
    Cyber Capability PlatformSkill PathwaysLab EnvironmentsCapture the Flag
    Live & Instructor-Led
    Instructor-Led ExperiencesLive WorkshopsTabletop ExercisesCrisis Simulations
  • Security Insights Library
    Sectors
    Financial ServicesHealthcareManufacturingPaymentsLegalDefenseComms and Media
    On-Demand Topics
    Artificial Intelligence (AI) in SecurityCloud SecurityIncident ResponseForensics and Malware AnalysisThreat Intelligence & Threat HuntingGovernance, Risk & Compliance (GRC)Software Supply Chain Security
    Event Topics
    AI Security (Adversarial AI & Defense)Bug HuntingHardware & Embedded SecurityDevice SecurityOperational Technology (OT) SecurityPlatform SecurityResearch and Vulnerabilities
  • Resources
  • Contact
  • Login
  • About
    About CyberEd.io
    Who We AreOur ValuesChallenges We Solve
    Community
    Information Security Media GroupCyberEdBoardAdvisory Board
    Innovation
    Our MethodologyAI-Powered TrainingEnterprise Integration
  • Training Solutions
    On-Demand
    Security Insights LibraryIndustry-BasedRole-BasedMasterclasses
    Hands-On
    Cyber Capability PlatformSkill PathwaysLab EnvironmentsCapture the Flag
    Live & Instructor-Led
    Instructor-Led ExperiencesLive WorkshopsTabletop ExercisesCrisis Simulations
  • Security Insights Library
    Sectors
    Financial ServicesHealthcareManufacturingPaymentsLegalDefenseComms and Media
    On-Demand Topics
    Artificial Intelligence (AI) in SecurityCloud SecurityIncident ResponseForensics and Malware AnalysisThreat Intelligence & Threat HuntingGovernance, Risk & Compliance (GRC)Software Supply Chain Security
    Event Topics
    AI Security (Adversarial AI & Defense)Bug HuntingHardware & Embedded SecurityDevice SecurityOperational Technology (OT) SecurityPlatform SecurityResearch and Vulnerabilities
  • Resources
  • Contact
  • Login
Back

Social Engineering

Navigating the Risks of Social Engineering Attacks

Join Bob Slocum, Product Marketing Director at Tessian discusses the most sophisticated, real-world email social engineering attacks found by Tessian's threat intelligence team.

Course duration Duration: 15 minutes

Identity-Centric Cybersecurity: Building on Zero Trust

Join Jeremy Grant, Managing Director, Technology Business Strategy, Venable, LLP and Coordinator, Better Identity Coalition and explore Identity Access Management today!

Course duration Duration: 30 minutes

FIDO Alliance: The Future of Automation

Join Jeremy Grant, Managing Director, Technology Business Strategy, Venable LLP in an exploration of role of the FIDO Alliance in standardizing phishing-resistant logins that make authentication simpler and stronger.

Course duration Duration: 30 minutes

How Windows 11 Enables Zero Trust Protection

Join Nischay Kandpal, Program Manager Evangelism , Product Specialist-Commercial, Microsoft as he highlights how Windows 11 enables zero trust protection.

Course duration Duration: 25 minutes

How AI Is Shaping Cybersecurity

Join Kayzad Vanskuiwalla and Harshil Doshi in a discussion of how AI is shaping cybersecurity.

Price
Course duration Duration: 25 minutes

Payments Fraud: How to Stop Cyber Perpetrators

Join Dr. Lopa Mudraa Basuu and Anuj Bhansali in an exploration of payment fraud and defense.

Price
Course duration Duration: 25 minutes

Rise & Reinvention of Business Email Compromise

Join Michael DeNicola in a conversation about social engineering tactics and what organizations can do to thwart them.

Price
Course duration Duration: 15 minutes

How I Hacked Your Bank Account

Security researcher Nemo examines UPI's security architecture, revealing critical vulnerabilities in mobile number verification and offering recommendations to strengthen India's digital payment ecosystem.

Price
Course duration Duration: 25 minutes

MITM on PSTN

Kirils Solovjovs of Possible Security exposes novel methods for intercepting phone calls through PSTN vulnerabilities, demonstrating how attackers can exploit SS7 protocols and call routing mechanisms.

Price
Course duration Duration: 30 minutes
Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement
Ask CyberEd Learning Advisor a question?

Floating Button