

Combined African Technology
Beyond Expectations
Cybersecurity training
CAT's cybersecurity training will start with the Introduction
of how to identify hackers, what is cybersecurity
and why it pays to be cyber smart.

Learn how
to spot the bait as we guide you
through the dangers of phishing. Is
this actually a very exciting email from
a legitimate company, person, or is it
just another hacker’s trap?

It’s a jungle in there. Explore the
winding paths of the internet with
animated characters as they venture
into thorny areas like fake browser
warnings, HTTPS and dangerous
URLs.

A system is only as secure as its
password. Join us as we get to grips
with the challenges of creating a
strong password … because safety is
not as easy as 1 2 3.

explore the ups and downs of phone security. What
is encryption? What kind of damage could a stolen
phone do? Learn how to take security with you
wherever you go.

Sometimes,
trouble follows you home. Join us as we explore
the dangers of working remotely from password
cracks to malware attacks.

CAT's cybersecurity training will start with the Introduction
of how to identify hackers, what is cybersecurity
and why it pays to be cyber smart.
