Skip to main content
Amartha Academy
Academy Update
Amarthapedia Help
Log in
Home
Courses
(hidden)
(hidden)
Cyber Security Collection
Cyber Security Collection
Course categories:
Financial literacy
Bisnis Proses Amartha
General
60 Seconds Collection
Belonging & Inclusion Collection
Business Manager & Owner Collection
Policy & Compliance Collection
Establishing a Learning Culture
Creativity & Innovation Collection
Customer Service Collection
Cyber Security Collection
Digital Transformation Collection
Environment, Social, & Governance Collection
Financial Conduct Authority Collection
Food Safety Collection
Health & Safety Collection
Health & Wellbeing Collection
Human Resources Collection
Refreshing Collection
Mental Health Collection
Leadership & People Management - Core Skills & Power Skills
Leadership & People Management - Leadership Styles & Situations
Leadership & People Management - Looking after Your Team
Leadership & People Management - Team Performance
Safeguarding Collection
Sales Skills Collection
Soft Skills Collection
Psychological Safety Collection
Power Skills
Life Skills
Career Management Collection
Coaching Collection
Project Management Collection
KCSIE
Digital Security
Personal Development
Finance
Content Creator
Digital Transformation
Flash Expert Class
Search courses
Go
1
(current)
2
»
Next
Working Remotely (but Safely)
Category:
Cyber Security Collection
Wi-Fi Security
Category:
Cyber Security Collection
Stolen Devices
Category:
Cyber Security Collection
Ransomware
Category:
Cyber Security Collection
Protecting Your Personal Data
Category:
Cyber Security Collection
Multifactor & 2F Authentication
Category:
Cyber Security Collection
Life in the Cloud
Category:
Cyber Security Collection
Fake News
Category:
Cyber Security Collection
Disaster Recovery
Category:
Cyber Security Collection
Choosing the Right Cloud Vendor
Category:
Cyber Security Collection
GDPR Overview
Category:
Cyber Security Collection
Data Breaches
Category:
Cyber Security Collection
The Role of Data Protection Officers
Category:
Cyber Security Collection
Data Handling (Best Practices)
Category:
Cyber Security Collection
Subject Access Requests
Category:
Cyber Security Collection
Denial of Service Attack
Category:
Cyber Security Collection
Spoofing Attacks
Category:
Cyber Security Collection
Email Security
Category:
Cyber Security Collection
The Internet of Things
Category:
Cyber Security Collection
Protection & Infection Control
Category:
Cyber Security Collection
1
(current)
2
»
Next
Menu
Home