9Â Results
-
A Day In the Life Theme: Security Awareness
This course covers every topic required by major standards and regulations and is designed to change user behavior by diving deeply into each topic. Employees will master the fundamentals of information security including key principles, concepts, vulnerabilities, threats and how to counter them. By mastering the information presented in this course, employees will be able to defend personal and workplace data from malicious threats. In this highly interactive course, learners will explore key information security concepts, examine threats and how to counter them and review safe computing habits that can be applied at home and in the workplace. By following the best practice lessons covered in this course, participants will be better able to recognize cyber threats and know how to defend against them. Key Topics: Introduction, password management, viruses and malware, mobile data, physical security, social engineering, phishers, acceptable use policies incident response, security services, risk management, network eavesdropping, encryption, malware, backups, protecting your home computer, and identity theft.70 Minutes -
Appropriate Use of Social Media
Social media can be an excellent tool to connect and interact with customers, show thought leadership, and build a brand, but it also poses unique security, HR, and public relations challenges. This course covers social media best practices including secure use, accountability, harassment, how to spot scams, secure passwords, and advanced security features. This HTML5-based, iPad-compatible course uses high-quality video and real-world simulations to teach best practices for social media.14 Minutes -
Defeating Social Engineers (Advanced)
With increasingly sophisticated technical defenses for networks and computer systems, hackers often decide that it's much easier to simply go around these perimeter defenses by attacking the end user. After all, end users have what they want “ a computer that's behind the network firewall, a network username and password, and possibly access to trade secrets, confidential information, and bank accounts. This course will teach end users how to identify and avoid giving away sensitive information to these hackers.17 Minutes -
Human Firewall Theme: Security Awareness and Literacy
This course covers every topic required by major standards and regulations, and is designed to change user behavior by diving deeply into each topic. Employees will learn the fundamentals of information security including key principles, concepts, vulnerabilities, threats and how to counter them. By mastering the information presented in this course they will be able to defend your personal and workplace data from malicious threats and become certified in information security awareness and literacy. Key Topics: Introduction, password management, viruses and malware, mobile data, physical security, social engineering, phishers, acceptable use policies incident response, security services, risk management, network eavesdropping, encryption, malware, backups, protecting your home computer, identity theft, privacy and legal issues.90 Minutes -
PCI Essentials for Cardholder Data Handlers and Supervisors
This course teaches employees and supervisors what PCI DSS is, how it affects your organization and the best practices they should follow to protect cardholder data and detect and prevent fraud. This course is meant for employees and supervisors in companies that require PCI DSS - 3.2 compliance.25 Minutes -
Phishing
Because today's computers and networks are heavily defended from a direct assault, hackers are now much more likely target end-users when trying to break in. If hackers can trick you into divulging your username and password or inadvertently infecting your computer with malicious software, they can use your computer as a launching point to further penetrate your organization's network. This HTML5-based, iPad-compatible course uses high-quality video and real-world simulations to teach best practices for recognizing and preventing both phishing and spear-phishing attacks.12 Minutes -
Protecting Mobile Data and Devices
Because today's smartphones and tablets can not only act as a phone, but also as an email client, mobile Internet device, camera, GPS navigation system, entertainment console, and platform for any number of applications (apps), they can be exposed to many of the same risks as a desktop computer. This HTML5-based, iPad-compatible course uses high-quality video and real-world simulations to teach best practices for mobile security.8 Minutes -
Security Awareness Essentials
This course covers a high level overview of the major standards and topics of the NIST. Employees will master the fundamentals of information security including key threats and how to counter them. By mastering the information presented in this course, employees will be able to defend workplace data from malicious threats and become certified in basic security awareness. This security awareness training course covers key security best practices end users should follow so they can prevent, detect, and respond to information security threats. Key Topics: Introduction, password management, identity theft, malware, social engineering, phishing, physical security, travel safety, mobile data, privacy and acceptable use Updated statistics, Ransomware expansion, Spear Phishing expansion.30 Minutes -
Strongest Link Theme: Security Awareness and Literacy
This course covers every topic required by major standards and regulations, and is designed to change user behavior by diving deeply into each topic. Employees will master the fundamentals of information security including key principles, concepts, vulnerabilities, threats and how to counter them. By mastering the information presented in this course, employees will be able to defend personal and workplace data from malicious threats. Key Topics: Introduction, password management, viruses and malware, mobile data, physical security, social engineering, phishers, acceptable use policies incident response, security services, risk management, network eavesdropping, encryption, malware, backups, protecting your home computer, identity theft, privacy and legal issues.50 Minutes