ESED Academy
ESED Resources and Learning Center
Most dangerous cyber attacks

Most dangerous cyber attacks
Types, real cases, and how to protect your company.
Ransomware guide

Ransomware guide
Importance of implementing endpoints to prevent ransomware attacks.
Cyber attacks on Instagram

Cyber attacks on Instagram
Consequences of a hacked account and how to recover it.
ESED Attack technical manual: Security validation
.png?width=1000&height=627&name=Gu%C3%ADa%20ransomware%20-%20cover%20(3).png)
ESED Attack technical manual: Security validation
Discover how secure your IT system is.