Silvino Santos, our Tech Lead, boasts 20+ years of experience as a digital content consultant and trainer. He's a Cybersecurity Master's grad and Competitive Intelligence Analyst focused on enhancing professional performance and profitability via tech innovation and knowledge resources. Silvino's role at MBU Intelligence is central to guiding teams and organizations in the tech and knowledge management landscape.
Join me on a transformative journey to leadership, success, happiness, and well-being. Through AI, digital transformation, and third-gen therapies, I provide a unique approach to revolutionize your personal and professional growth.
Ricardo Andorinho is from Évora, Portugal. He is an international handball player having played in 155 matches. Ricardo is the author of a management guide “Awaken Your Genius” and founder of MBU Intelligence - a company that drives innovation. Using his business focus and experience in finance, innovation and business performance, Ricardo specialises in innovation through people.
S2 - A1 Consequences of Cybersecurity Privilege Abuse
S2 - Q1 Test your learning - Consequences of Cybersecurity Privilege Abuse
S2 - A2 Preventing and Mitigating Privilege Abuse
S2 - Q2 Test your learning - Preventing and Mitigating Privilege Abuse
Section 3 - Cybersecurity Repercussions of Stolen Credentials
S3 - A1 Consequences of Stolen Credentials in Cybersecurity
S3 - Q1 Test your learning - Consequences of Stolen Credentials in Cybersecurity
S3 - A2 Preventing and Mitigating Stolen Credentials in Cybersecurity:
S3 - Q2 Test your knowledge - Preventing and Mitigating Stolen Credentials in Cybersecurity
Section 4 - Impacts of Social Engineering in Cybersecurity
S4 - A1 Consequences of Cybersecurity Social Engineering
S4 - Q1 Test your learning - Consequences of Cybersecurity Social Engineering
S4 - A2 Preventing and Mitigating Social Engineering Attacks
S4 - Q2 Test your knowledge - Preventing and Mitigating Social Engineering Attacks
Section 5 - Business Email Compromise (BEC) attack for commercial fraud.
S5 - A1 Consequences of Business Email Compromise (BEC)
S5 - Q1 Test your learning - Business Email Compromise (BEC) attack for retail fraud.
S5 - A2 Preventing and Mitigating of Business Email Compromise (BEC)
S5 - Q2 Test your learning - Preventing and Mitigating of Business Email Compromise (BEC)
Section 6 - Cognitive Biases and Their Impact on Cybersecurity
S6 - A1 Consequences of Cognitive Biases and Their Impact on Cybersecurity
S6 - Q1 Test your learning - Consequences of Cognitive Biases and Their Impact on Cybersecurity
S6 - A2 Preventing and Mitigating Cognitive Biases and Their Impact on Cybersecurity
S6 - Q2 Test your learning - Preventing and Mitigating Cognitive Biases and Their Impact on Cybersecurity
Trends and Conclusion in Human-Centered Cybersecurity
CA1Trends in Human-Centered Cybersecurity
CQ1 Test your knowledge - Trends in Human-Centered Cybersecurity
CA2 Conclusions
CQ2 Test your knowledge - Conclusions
Determine your level of knowledge
To conclude, assess your current level of knowledge
Last step: Determine your current level of knowledge
Before you go...
Drag handle to reorder lessoS1 Improving iSecure (NPS)
Drag handle to reorder lessS2 Safety at work - On a scale of 0 to 10 (0 = Not at all likely, 10 = Extremely likely)
iSecure Programs
Critical information, including customer information, intellectual property, and financial data, are made available while maintaining their confidentiality, integrity, and availability. It guarantees operational continuity, legal compliance, and defense against cyberthreats.