Techniques for collecting and analysing information
relevant to security threats.
Techniques for using words to deescalate
confrontational situations effectively.
Introduction to protecting organizations
against cyber threats.