Skip to main content
Amartha Academy
Academy Update
Amarthapedia Help
Log in
Home
Courses
(hidden)
(hidden)
Cyber Security Collection
Cyber Security Collection
Course categories:
General
Amartha Product
Bisnis Proses Amartha
Creative Leadership
Digital Marketing
Financial literacy
FnB Business
60 Seconds Collection
BEDI Collection
Business Manager Collection
Coaching Collection
Compliance Collection
Core Skills
Creating a Learning Culture
Creativity & Innovation Collection
Customer Service Collection
Cyber Security Collection
Digital Transformation Collection
Environment & Sustainability Collection
Financial Conduct Authority Collection
Food Safety Collection
Health & Safety Collection
Health & Wellbeing Collection
Human Resources Collection
Keeping Children Safe in Education (KCSIE)
Leadership Styles & Situations
Leadership: Team Performance
Life Skills Collection
Looking after Your Team
Mental Health Collection
Office Health & Safety
Power Skills
Personal & Professional Developments Collection
Project Management Collection
Psychological Safety Collection
Safeguarding Collection
Sales Skills Collection
Soft Skills Collection
Mandatory All Employee
HO - Onboarding Program
HO - Mandatory Program
HO - Technical Program
A-Mentorship
LEAD (Leadership Empowerment And Development)
AMBI - Amartha for Better Indonesia
Flash Expert Class
FO - Onboarding Program
FO - Mandatory Program
FO - Development Program
FO - Refreshment Program
FO - Enhancement Program
FO - Inkubasi Program
Fraud Awareness
FO - Special Program
Sosialisasi & Product Update
Search courses
Go
1
(current)
2
»
Next
Multifactor & 2F Authentication
Category:
Cyber Security Collection
Ransomware
Category:
Cyber Security Collection
Disaster Recovery
Category:
Cyber Security Collection
Protecting Your Personal Data
Category:
Cyber Security Collection
Stolen Devices
Category:
Cyber Security Collection
WiFi Security
Category:
Cyber Security Collection
Choosing The Right Cloud Vendor
Category:
Cyber Security Collection
Fake News
Category:
Cyber Security Collection
Life in the Cloud
Category:
Cyber Security Collection
Working Remotely (But Safely)
Category:
Cyber Security Collection
GDPR Overview
Category:
Cyber Security Collection
Data Breaches
Category:
Cyber Security Collection
The Role of Data Protection Officers
Category:
Cyber Security Collection
Data Handling (Best Practices)
Category:
Cyber Security Collection
Subject Access Requests
Category:
Cyber Security Collection
Denial of Service Attack
Category:
Cyber Security Collection
Spoofing Attacks
Category:
Cyber Security Collection
Email Security
Category:
Cyber Security Collection
The Internet of Things
Category:
Cyber Security Collection
Protection & Infection Control
Category:
Cyber Security Collection
1
(current)
2
»
Next
Menu
Home