{"id":5585,"date":"2022-02-16T10:53:08","date_gmt":"2022-02-16T09:53:08","guid":{"rendered":"https:\/\/agmtest.net\/agmsolutions_v2\/?post_type=portfolio&#038;p=5585"},"modified":"2025-04-22T15:44:24","modified_gmt":"2025-04-22T13:44:24","slug":"corso-cybersecurity","status":"publish","type":"portfolio","link":"https:\/\/dev.agmtest.net\/en\/product\/corso-cybersecurity\/","title":{"rendered":"Corso Cybersecurity"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"5585\" class=\"elementor elementor-5585\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ea1c8a6 pt-5 pb-3 pb-lg-5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ea1c8a6\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\r\n\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-064b377 d-col-block position-static\" data-id=\"064b377\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-acdcca8 tri-bottom mb-0 elementor-widget elementor-widget-html\" data-id=\"acdcca8\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\" viewbox=\"0 0 2000 120\" preserveaspectratio=\"xMinYMin\">\n\t<polygon fill=\"#FFF\" points=\"-11,2 693,112 2019,6 2019,135 -11,135 \"><\/polygon>\n<\/svg>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b385f23 py-2 mb-0 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"b385f23\" data-element_type=\"widget\" data-settings=\"{&quot;_animation_delay&quot;:200,&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.17.0 - 08-11-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h3 class=\"elementor-heading-title elementor-size-default\">Learn to recognise and counteract cyber threats<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-404c1eb mb-3 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"404c1eb\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cybersecurity GO<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e0b3bb mb-4 pb-2 custom-font1 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"2e0b3bb\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">The course to acquire the basic information to be able to recognize the various types of cyber threats and implement a first line of corporate defense.<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d0aff97 pr-lg-5 mb-3 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"d0aff97\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:800}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.17.0 - 08-11-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<div class=\"q_elements_holder one_column responsive_mode_from_768\"><div class=\"q_elements_item\" data-1024-1280=\"0 71px 0 44px\" data-768-1024=\"0 56px 0 44px\" data-480=\"0 16px 0 44px\" data-animation=\"no\" data-item-class=\"q_elements_holder_custom_161908\"><div class=\"q_elements_item_inner\"><div class=\"q_elements_item_content q_elements_holder_custom_161908\"><div class=\"wpb_text_column wpb_content_element\"><div class=\"wpb_wrapper\"><p class=\"_04xlpA direction-ltr align-start para-style-body\"><span class=\"JsGRdQ\">The programme is structured into four modules, with the following contents:<\/span><\/p><p class=\"_04xlpA direction-ltr align-start para-style-body\"><strong><span class=\"JsGRdQ\">Module 1 - Cyber Security Introduction<\/span><\/strong><\/p><ul><li><span class=\"JsGRdQ\">Introduction to the concept of Cyber Security<\/span><\/li><li><span class=\"JsGRdQ\">Types and distribution of attackers<\/span><\/li><li><span class=\"JsGRdQ\">The evolution of the threat<\/span><\/li><li><span class=\"JsGRdQ\">Main types of cyber attacks<\/span><\/li><li><span class=\"JsGRdQ\">Main types of virus or malware Understanding whether a received file can be considered malicious<\/span><\/li><\/ul><p class=\"_04xlpA direction-ltr align-start para-style-body\"><strong><span class=\"JsGRdQ\">Modulo 2 \u2013 Vettori di attacco a mezzo e-mail<\/span><\/strong><\/p><ul><li><span class=\"JsGRdQ\">Spam<\/span><\/li><li><span class=\"JsGRdQ\">Phishing e Spear Phishing<\/span><\/li><li><span class=\"JsGRdQ\">Social Engineering<\/span><\/li><li><span class=\"JsGRdQ\">Understanding whether or not our e-mail address has been compromised<\/span><\/li><li><span class=\"JsGRdQ\">Establishing the authenticity of an e-mail<\/span><\/li><li><span class=\"JsGRdQ\">Exercise: Detecting a social engineering attempt<\/span><\/li><\/ul><p class=\"_04xlpA direction-ltr align-start para-style-body\"><strong><span class=\"JsGRdQ\">Module 3 - Password Management and Secure Web browsing<\/span><\/strong><\/p><ul><li><span class=\"JsGRdQ\">Guidelines for Generating Effective Passwords<\/span><\/li><li><span class=\"JsGRdQ\">The importance of frequently updating the password and differentiating it for each service<\/span><\/li><li><span class=\"JsGRdQ\">Use of a Password Manager<\/span><\/li><li><span class=\"JsGRdQ\">Check whether our password has been compromised<\/span><\/li><li><span class=\"JsGRdQ\">Password caching<\/span><\/li><li><span class=\"JsGRdQ\">Advertisement e contenuti sponsorizzati<\/span><\/li><li><span class=\"JsGRdQ\">Siti malevoli e typosquatting<\/span><\/li><li><span class=\"JsGRdQ\">Malicious site notifications<\/span><\/li><li><span class=\"JsGRdQ\">The http and https protocols<\/span><\/li><li><span class=\"JsGRdQ\">Understanding whether a malicious site is sending notifications within our browser<\/span><\/li><\/ul><p class=\"_04xlpA direction-ltr align-start para-style-body\"><strong><span class=\"JsGRdQ\">Module 4 - Ransomware<\/span><\/strong><\/p><ul><li><span class=\"JsGRdQ\">How a ransomware works<\/span><\/li><li><span class=\"JsGRdQ\">Bitcoin and ransomware<\/span><\/li><li><span class=\"JsGRdQ\">Come proteggersi dai ransomware?<\/span><\/li><li><span class=\"JsGRdQ\">Come rilevare un ransomware?<\/span><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/section>\r\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6cb4d37 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6cb4d37\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\r\n\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e639778\" data-id=\"e639778\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d74456 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"3d74456\" data-element_type=\"widget\" data-settings=\"{&quot;_animation_delay&quot;:200,&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Do you want to participate?<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f7b7905\" data-id=\"f7b7905\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-47d3731 elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"47d3731\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/agmsolutions.net\/contatti\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">CONTACT US<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/section>\r\n\t\t\t\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Impara a riconoscere e a contrastare le minacce informatiche Cybersecurity GO Il corso per acquisire le informazioni di base per poter riconoscere le varie tipologie di minacce informatiche e mettere in atto una prima linea di difesa aziendale. Il programma \u00e8 strutturato in quattro moduli, con i seguenti contenuti: Modulo 1 \u2013 Introduzione Cyber Security [&hellip;]<\/p>","protected":false},"featured_media":322,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"portfolio_cat":[45],"portfolio_skills":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Corso Cybersecurity - AGM Solutions<\/title>\n<meta name=\"description\" content=\"Impara a riconoscere e contrastare le minacce informatiche, il corso \u00e8 strutturato in quattro moduli, con i seguenti contenuti:..\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dev.agmtest.net\/en\/product\/corso-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Corso Cybersecurity - AGM Solutions\" \/>\n<meta property=\"og:description\" content=\"Impara a riconoscere e contrastare le minacce informatiche, il corso \u00e8 strutturato in quattro moduli, con i seguenti contenuti:..\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dev.agmtest.net\/en\/product\/corso-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"AGM Solutions\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-22T13:44:24+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dev.agmtest.net\/product\/corso-cybersecurity\/\",\"url\":\"https:\/\/dev.agmtest.net\/product\/corso-cybersecurity\/\",\"name\":\"Corso Cybersecurity - AGM Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/dev.agmtest.net\/#website\"},\"datePublished\":\"2022-02-16T09:53:08+00:00\",\"dateModified\":\"2025-04-22T13:44:24+00:00\",\"description\":\"Impara a riconoscere e contrastare le minacce informatiche, il corso \u00e8 strutturato in quattro moduli, con i seguenti contenuti:..\",\"breadcrumb\":{\"@id\":\"https:\/\/dev.agmtest.net\/product\/corso-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dev.agmtest.net\/product\/corso-cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dev.agmtest.net\/product\/corso-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dev.agmtest.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products\",\"item\":\"https:\/\/dev.agmtest.net\/product\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Corso Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dev.agmtest.net\/#website\",\"url\":\"https:\/\/dev.agmtest.net\/\",\"name\":\"AGM Solutions\",\"description\":\"Innovation Technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dev.agmtest.net\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Corso Cybersecurity - AGM Solutions","description":"Impara a riconoscere e contrastare le minacce informatiche, il corso \u00e8 strutturato in quattro moduli, con i seguenti contenuti:..","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dev.agmtest.net\/en\/product\/corso-cybersecurity\/","og_locale":"en_GB","og_type":"article","og_title":"Corso Cybersecurity - AGM Solutions","og_description":"Impara a riconoscere e contrastare le minacce informatiche, il corso \u00e8 strutturato in quattro moduli, con i seguenti contenuti:..","og_url":"https:\/\/dev.agmtest.net\/en\/product\/corso-cybersecurity\/","og_site_name":"AGM Solutions","article_modified_time":"2025-04-22T13:44:24+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dev.agmtest.net\/product\/corso-cybersecurity\/","url":"https:\/\/dev.agmtest.net\/product\/corso-cybersecurity\/","name":"Corso Cybersecurity - AGM Solutions","isPartOf":{"@id":"https:\/\/dev.agmtest.net\/#website"},"datePublished":"2022-02-16T09:53:08+00:00","dateModified":"2025-04-22T13:44:24+00:00","description":"Impara a riconoscere e contrastare le minacce informatiche, il corso \u00e8 strutturato in quattro moduli, con i seguenti contenuti:..","breadcrumb":{"@id":"https:\/\/dev.agmtest.net\/product\/corso-cybersecurity\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dev.agmtest.net\/product\/corso-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dev.agmtest.net\/product\/corso-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dev.agmtest.net\/"},{"@type":"ListItem","position":2,"name":"Products","item":"https:\/\/dev.agmtest.net\/product\/"},{"@type":"ListItem","position":3,"name":"Corso Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/dev.agmtest.net\/#website","url":"https:\/\/dev.agmtest.net\/","name":"AGM Solutions","description":"Innovation Technology","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dev.agmtest.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/portfolio\/5585"}],"collection":[{"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/portfolio"}],"about":[{"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/types\/portfolio"}],"replies":[{"embeddable":true,"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/comments?post=5585"}],"version-history":[{"count":14,"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/portfolio\/5585\/revisions"}],"predecessor-version":[{"id":16522,"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/portfolio\/5585\/revisions\/16522"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/media?parent=5585"}],"wp:term":[{"taxonomy":"portfolio_cat","embeddable":true,"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/portfolio_cat?post=5585"},{"taxonomy":"portfolio_skills","embeddable":true,"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/portfolio_skills?post=5585"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}