- Level 1 - No technical knowledge required
- Level 2 - Moderately technical
- Level 3 - Technical
Data protection
Information on how to legally protect personal information.
Information on how to legally protect personal information.
The use of remote access software in committing crime online is not very wellknown, let alone how easily criminals use this method to attack unassumingvictims. Remote access scams occur where online business and individual accounts arecompromised by cyber criminals and […]
Read more Remote Access Fraud in modal dialogThis month’s CyberByte focuses on a growing online threat linked to our increasing reliance on digital wallets – often referred to as digital pickpocketing. As our lives become ever more connected, the convenience of storing payment cards, tickets and identification […]
Read more CyberByte – November 2025 in modal dialogCyber security advice to protect your business and the technology you rely on.
Read more Self Employed & Sole Traders in modal dialogThis programme provides CEOs, Directors and Non-Executive Directors with frameworks and best practice for managing cyber security-related risk, separate from the specialised IT infrastructure typically associated with this topic. Course content includes lectures and highly interactive discussions, as well as […]
Read more Executive Education Training: Cyber Security in modal dialogFree e-learning training introduces why cyber security is important and how attacks happen. It will give you actionable advice about how to defend yourself. The NCSC’s e-learning package ‘Top Tips For Staff’ can be completed online, or built into your […]
Read more Cyber Training for Staff in modal dialogThis Framework sets out Scotland’s vision for a cyber resilient Scotland and includes refreshed action plans.
Read more The Strategic Framework for a Cyber Resilient Scotland in modal dialog