Cybersecurity breaches continue to rise, and organisations recognise that security is the responsibility of the entire business. In order to help out, here at New Horizons we are offering a range of cybersecurity resources to help mitigate and prevent the growing sophistication of cyber-attackers and build cyber-safe practices and systems.

Security Courses

Cybersecurity Tips

In order to help out with the ever increasing cybersecurity dangers that all organisation face, day in, day out. We have put together a collection of cybersecurity tips, resources and webinars for you to take advantage of.

More tips and resources will be added throughout October, so keep coming back for more.

Disable Cookies

Disable Cookies

Did you know enabling cookies could compromise your security? Watch
our tip of the day to learn how to prevent cybercriminals from accessing
your personal information via cookies.

Watch Video

Multifactor Authentication
Multi-Factor Authentication

Did you know there’s a quick way to add an extra layer of protection to your accounts? Watch our tip of the day to learn more about multifactor authentication.

Watch Video

Naming your router

Naming Your Router

If you own a router, you must know how to protect it from cyberattacks. Watch our tip of the day to learn a quick and easy way to keep your router secure.

Watch Video

Protecting Your Passwords
Protecting Your Passwords

Taking a few simple steps to secure your accounts can make all the difference. Watch our tip of the day to learn how to create and store strong passwords.

Watch Video

Sender Beware
Sender Beware

If you're not careful, it's easy to fall for email scams. Watch our tip of the
day for four simple ways to properly verify if an email is legitimate.

Watch Video

Smart Speaker Safety
Smart Speaker Safety

Do you ever worry about all the information your smart speaker is
capturing and storing? Watch our tip of the day to learn how to
eliminate the data stored on your smart speaker.

Watch Video

Cybersecurity Resources



Latest Blog Posts

11 Tips for Small Business Cybersecurity Protection

The Ultimate CompTIA Security+ Guide

How To Become A Cybersecurity Professional

Are You Opening the Door to Black Hats?

Other Resources


Highlighted Courses

CertNexus Certified CyberSec First Responder

The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.

Learning Objectives

In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will:

  • Assess cybersecurity risks to the organization.
  • Analyze the threat landscape.
  • Analyze various reconnaissance threats to computing and network environments.
  • Analyze various attacks on computing and network environments.
  • Analyze various post-attack techniques.
  • Assess the organization's security posture through auditing, vulnerability management, and penetration testing.
  • Collect cybersecurity intelligence from various network-based and host-based sources.
  • Analyze log data to reveal evidence of threats and incidents.
  • Perform active asset and network analysis to detect incidents.
  • Respond to cybersecurity incidents using containment, mitigation, and recovery tactics.
  • Investigate cybersecurity incidents using forensic analysis techniques.

View dates

5 day course Normally runs 14:00 to 22:00 Live Online Can be run in person.
Contact us for details.

CertNexus CyberSAFE

Welcome to CyberSAFE: Exam CBS-410. Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will help you to:

  • Understand both security and compliance needs and requirements.
  • Recognize and avoid phishing and other social engineering attempts.
  • Recognize and avoid viruses, ransomware, and other malware.
  • Help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud.

In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely.


In this course, you will identify many of the common risks involved in using conventional computing technology, as well as ways to use it safely, to protect yourself from those risks. You will:

  • Identify security compliance measures.
  • Address social engineering attempts.
  • Secure devices such as desktops, laptops, tablets, smartphones, and more.
  • Use the Internet securely.

View dates

Half day course Normally runs 14:00 to 22:00 Live Online Can be run in person.
Contact us for details.

View all our cybersecurity courses