string(4) "here"
Catalogs
Series
Roles
Accreditation
Course Format
Package

Package Your Training

We understand our clients have unique business requirements, so we created flexible training packages to best meet the needs of your financial institution.

View Packages
  1. “The Internet of Things” and Home Security

    Almost anything can be made into a "smart" device, such as security cameras and sensors, TVs, garage door openers, door locks, wearable devices, pacemakers, and even cars. These devices are what we refer to as the "Internet of Things" (IoT), which holds the promise of adding a whole new level of convenience and connectedness to everyday life. Having that many new, connected computing devices, most of which record activity, presents new challenges for security and privacy. This course teaches employees the best practices for IoT devices both at home and at work.

    10 Minutes

    Series: Cybersecurity Advanced, Remote Worker Preparedness

    Course Type: Online Self-Paced

  2. Coronavirus Phishes and Scams

    As the coronavirus pandemic has spread across the globe, cyber-attacks have also been on the rise. Cybercriminals have increased their phishing attacks and are creating new scams as more and more people are staying at home and potentially working remotely for the first time. This brief course will teach learners to recognize the current patterns and elements of coronavirus-based phishes and scams and provide best practices on how to avoid their traps and stay secure.

    5 Minutes

    Series: Remote Worker Preparedness

    Course Type: Online Self-Paced

  3. Phishing Defense Essentials

    Learn how to stay ahead of hackers and cyber criminals who aim to steal data and insert malicious payloads by learning and applying the best practices outlined in this module.

    7 Minutes

    Series: Remote Worker Preparedness

    Course Type: Online Self-Paced

  4. Security Awareness for the Home

    Threats to our home network can quickly turn into threats to our workplace infrastructure and vice-versa. To combat against threats on all fronts, we must learn to practice safe computing habits both in the home and in the workplace. In this course, participants will be introduced to some key principles of safe system administration that they can use in the home that mirror techniques used in the workplace. By mastering the techniques found in this course, participants will learn to develop a regime of security-conscience behavior that will help keep important data safe from hackers, data thugs and cybercriminals.

    7 Minutes

    Series: Cybersecurity Advanced, Remote Worker Preparedness

    Course Type: Online Self-Paced

  5. Working Remotely

    Mobile computing devices like laptops, smartphones, and tablets can be found everywhere - at home, in the office, and everywhere in between. These devices, combined with high speed wireless connections, make working remotely easier than ever. However, working outside of a company's secured facilities expose an organization's physical and information assets to additional threats. This course gives the best practices for working remotely.

    7 Minutes

    Series: Remote Worker Preparedness

    Course Type: Online Self-Paced

  6. Protecting Mobile Data and Devices

    Because today's smartphones and tablets can not only act as a phone, but also as an email client, mobile Internet device, camera, GPS navigation system, entertainment console, and platform for any number of applications (apps), they can be exposed to many of the same risks as a desktop computer. This HTML5-based, iPad-compatible course uses high-quality video and real-world simulations to teach best practices for mobile security.

    8 Minutes

    Series: Cybersecurity Advanced, Cybersecurity Fundamentals, Remote Worker Preparedness

    Course Type: Online Self-Paced

  7. Phishing

    Because today's computers and networks are heavily defended from a direct assault, hackers are now much more likely target end-users when trying to break in. If hackers can trick you into divulging your username and password or inadvertently infecting your computer with malicious software, they can use your computer as a launching point to further penetrate your organization's network. This HTML5-based, iPad-compatible course uses high-quality video and real-world simulations to teach best practices for recognizing and preventing both phishing and spear-phishing attacks.

    12 Minutes

    Series: Cybersecurity Advanced, Cybersecurity Fundamentals, Remote Worker Preparedness

    Course Type: Online Self-Paced

  8. Email and Instant Messaging Security

    Email and instant messaging (IM) are essential communication tools that most people use just about every day. They're incredibly useful applications because they allow you to quickly and efficiently exchange messages and files with just about anyone else in the world. However, its a two-way street, meaning that since you can connect with anyone online, anyone else, including hackers and cybercriminals, can connect with you. This course teaches employees the email and IM best practices to protect both their organization's sensitive information and their own personal information and identity from attack.

    11 Minutes

    Series: Remote Worker Preparedness

    Course Type: Online Self-Paced